WorldWideScience

Sample records for one-way key rates

  1. One-way quantum key distribution: Simple upper bound on the secret key rate

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2006-01-01

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol

  2. Randomized dynamical decoupling strategies and improved one-way key rates for quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Kern, Oliver

    2009-05-25

    The present thesis deals with various methods of quantum error correction. It is divided into two parts. In the first part, dynamical decoupling methods are considered which have the task of suppressing the influence of residual imperfections in a quantum memory. Such imperfections might be given by couplings between the finite dimensional quantum systems (qudits) constituting the quantum memory, for instance. The suppression is achieved by altering the dynamics of an imperfect quantum memory with the help of a sequence of local unitary operations applied to the qudits. Whereas up to now the operations of such decoupling sequences have been constructed in a deterministic fashion, strategies are developed in this thesis which construct the operations by random selection from a suitable set. Formulas are derived which estimate the average performance of such strategies. As it turns out, randomized decoupling strategies offer advantages and disadvantages over deterministic ones. It is possible to benefit from the advantages of both kind of strategies by designing combined strategies. Furthermore, it is investigated if and how the discussed decoupling strategies can be employed to protect a quantum computation running on the quantum memory. It is shown that a purely randomized decoupling strategy may be used by applying the decoupling operations and adjusted gates of the quantum algorithm in an alternating fashion. Again this method can be enhanced by the means of deterministic methods in order to obtain a combined decoupling method for quantum computations analogously to the combining strategies for quantum memories. The second part of the thesis deals with quantum error-correcting codes and protocols for quantum key distribution. The focus is on the BB84 and the 6-state protocol making use of only one-way communication during the error correction and privacy amplification steps. It is shown that by adding additional errors to the preliminary key (a process called

  3. Randomized dynamical decoupling strategies and improved one-way key rates for quantum cryptography

    International Nuclear Information System (INIS)

    Kern, Oliver

    2009-01-01

    The present thesis deals with various methods of quantum error correction. It is divided into two parts. In the first part, dynamical decoupling methods are considered which have the task of suppressing the influence of residual imperfections in a quantum memory. Such imperfections might be given by couplings between the finite dimensional quantum systems (qudits) constituting the quantum memory, for instance. The suppression is achieved by altering the dynamics of an imperfect quantum memory with the help of a sequence of local unitary operations applied to the qudits. Whereas up to now the operations of such decoupling sequences have been constructed in a deterministic fashion, strategies are developed in this thesis which construct the operations by random selection from a suitable set. Formulas are derived which estimate the average performance of such strategies. As it turns out, randomized decoupling strategies offer advantages and disadvantages over deterministic ones. It is possible to benefit from the advantages of both kind of strategies by designing combined strategies. Furthermore, it is investigated if and how the discussed decoupling strategies can be employed to protect a quantum computation running on the quantum memory. It is shown that a purely randomized decoupling strategy may be used by applying the decoupling operations and adjusted gates of the quantum algorithm in an alternating fashion. Again this method can be enhanced by the means of deterministic methods in order to obtain a combined decoupling method for quantum computations analogously to the combining strategies for quantum memories. The second part of the thesis deals with quantum error-correcting codes and protocols for quantum key distribution. The focus is on the BB84 and the 6-state protocol making use of only one-way communication during the error correction and privacy amplification steps. It is shown that by adding additional errors to the preliminary key (a process called

  4. Coherent one-way quantum key distribution

    Science.gov (United States)

    Stucki, Damien; Fasel, Sylvain; Gisin, Nicolas; Thoma, Yann; Zbinden, Hugo

    2007-05-01

    Quantum Key Distribution (QKD) consists in the exchange of a secrete key between two distant points [1]. Even if quantum key distribution systems exist and commercial systems are reaching the market [2], there are still improvements to be made: simplify the construction of the system; increase the secret key rate. To this end, we present a new protocol for QKD tailored to work with weak coherent pulses and at high bit rates [3]. The advantages of this system are that the setup is experimentally simple and it is tolerant to reduced interference visibility and to photon number splitting attacks, thus resulting in a high efficiency in terms of distilled secret bits per qubit. After having successfully tested the feasibility of the system [3], we are currently developing a fully integrated and automated prototype within the SECOQC project [4]. We present the latest results using the prototype. We also discuss the issue of the photon detection, which still remains the bottleneck for QKD.

  5. Semi-device-independent security of one-way quantum key distribution

    International Nuclear Information System (INIS)

    Pawlowski, Marcin; Brunner, Nicolas

    2011-01-01

    By testing nonlocality, the security of entanglement-based quantum key distribution (QKD) can be enhanced to being ''device-independent.'' Here we ask whether such a strong form of security could also be established for one-way (prepare and measure) QKD. While fully device-independent security is impossible, we show that security can be guaranteed against individual attacks in a semi-device-independent scenario. In the latter, the devices used by the trusted parties are noncharacterized, but the dimensionality of the quantum systems used in the protocol is assumed to be bounded. Our security proof relies on the analogies between one-way QKD, dimension witnesses, and random-access codes.

  6. Semi-device-independent security of one-way quantum key distribution

    OpenAIRE

    Pawlowski, Marcin; Brunner, Nicolas

    2011-01-01

    By testing nonlocality, the security of entanglement-based quantum key distribution (QKD) can be enhanced to being 'device-independent'. Here we ask whether such a strong form of security could also be established for one-way (prepare and measure) QKD. While fully device-independent security is impossible, we show that security can be guaranteed against individual attacks in a semi-device-independent scenario. In the latter, the devices used by the trusted parties are non-characterized, but t...

  7. One-way shared memory

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2018-01-01

    Standard multicore processors use the shared main memory via the on-chip caches for communication between cores. However, this form of communication has two limitations: (1) it is hardly time-predictable and therefore not a good solution for real-time systems and (2) this single shared memory...... is a bottleneck in the system. This paper presents a communication architecture for time-predictable multicore systems where core-local memories are distributed on the chip. A network-on-chip constantly copies data from a sender core-local memory to a receiver core-local memory. As this copying is performed...... in one direction we call this architecture a one-way shared memory. With the use of time-division multiplexing for the memory accesses and the network-on-chip routers we achieve a time-predictable solution where the communication latency and bandwidth can be bounded. An example architecture for a 3...

  8. One way quantum repeaters with quantum Reed-Solomon codes

    OpenAIRE

    Muralidharan, Sreraman; Zou, Chang-Ling; Li, Linshu; Jiang, Liang

    2018-01-01

    We show that quantum Reed-Solomon codes constructed from classical Reed-Solomon codes can approach the capacity on the quantum erasure channel of $d$-level systems for large dimension $d$. We study the performance of one-way quantum repeaters with these codes and obtain a significant improvement in key generation rate compared to previously investigated encoding schemes with quantum parity codes and quantum polynomial codes. We also compare the three generation of quantum repeaters using quan...

  9. Fermionic One-Way Quantum Computation

    International Nuclear Information System (INIS)

    Cao Xin; Shang Yun

    2014-01-01

    Fermions, as another major class of quantum particles, could be taken as carriers for quantum information processing beyond spins or bosons. In this work, we consider the fermionic generalization of the one-way quantum computation model and find that one-way quantum computation can also be simulated with fermions. In detail, using the n → 2n encoding scheme from a spin system to a fermion system, we introduce the fermionic cluster state, then the universal computing power with a fermionic cluster state is demonstrated explicitly. Furthermore, we show that the fermionic cluster state can be created only by measurements on at most four modes with |+〉 f (fermionic Bell state) being free

  10. ONE WAY ANOVA RANDOMIZED COMPLETE BLOCKS

    African Journals Online (AJOL)

    ******

    2012-04-24

    Apr 24, 2012 ... Key words: Grey mullet, growth, foreign DNA, genetically modified. INTRODUCTION ... ration, food quality and preservation (Shears et al., 1991;. Chen et al. ... fish eggs (Khoo et al., 1992) and 4) direct injection of foreign DNA ...

  11. Efficient Constructions for One-way Hash Chains

    National Research Council Canada - National Science Library

    Hu, Yih-Chun; Jakobsson, Markus; Perrig, Adrian

    2003-01-01

    .... Our first construction, the Sandwich-chain, provides a smaller bandwidth overhead for one-way chain values, and enables efficient verification of one-way chain values if the trusted one-way chain value is far away...

  12. Secret key rates in quantum key distribution using Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bratzik, Sylvia; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2010-07-01

    The secret key rate r of a quantum key distribution protocol depends on the involved number of signals and the accepted ''failure probability''. We reconsider a method to calculate r focusing on the analysis of the privacy amplification given by R. Renner and R. Koenig (2005). This approach involves an optimization problem with an objective function depending on the Renyi entropy of the density operator describing the classical outcomes and the eavesdropper system. This problem is analyzed for a generic class of QKD protocols and the current research status is presented.

  13. Application of one-way ANOVA in completely randomized experiments

    Science.gov (United States)

    Wahid, Zaharah; Izwan Latiff, Ahmad; Ahmad, Kartini

    2017-12-01

    This paper describes an application of a statistical technique one-way ANOVA in completely randomized experiments with three replicates. This technique was employed to a single factor with four levels and multiple observations at each level. The aim of this study is to investigate the relationship between chemical oxygen demand index and location on-sites. Two different approaches are employed for the analyses; critical value and p-value. It also presents key assumptions of the technique to be satisfied by the data in order to obtain valid results. Pairwise comparisons by Turkey method are also considered and discussed to determine where the significant differences among the means is after the ANOVA has been performed. The results revealed that there are statistically significant relationship exist between the chemical oxygen demand index and the location on-sites.

  14. One-way quantum repeaters with quantum Reed-Solomon codes

    Science.gov (United States)

    Muralidharan, Sreraman; Zou, Chang-Ling; Li, Linshu; Jiang, Liang

    2018-05-01

    We show that quantum Reed-Solomon codes constructed from classical Reed-Solomon codes can approach the capacity on the quantum erasure channel of d -level systems for large dimension d . We study the performance of one-way quantum repeaters with these codes and obtain a significant improvement in key generation rate compared to previously investigated encoding schemes with quantum parity codes and quantum polynomial codes. We also compare the three generations of quantum repeaters using quantum Reed-Solomon codes and identify parameter regimes where each generation performs the best.

  15. Efficient one-way quantum computations for quantum error correction

    International Nuclear Information System (INIS)

    Huang Wei; Wei Zhaohui

    2009-01-01

    We show how to explicitly construct an O(nd) size and constant quantum depth circuit which encodes any given n-qubit stabilizer code with d generators. Our construction is derived using the graphic description for stabilizer codes and the one-way quantum computation model. Our result demonstrates how to use cluster states as scalable resources for many multi-qubit entangled states and how to use the one-way quantum computation model to improve the design of quantum algorithms.

  16. Robust and scalable optical one-way quantum computation

    International Nuclear Information System (INIS)

    Wang Hefeng; Yang Chuiping; Nori, Franco

    2010-01-01

    We propose an efficient approach for deterministically generating scalable cluster states with photons. This approach involves unitary transformations performed on atoms coupled to optical cavities. Its operation cost scales linearly with the number of qubits in the cluster state, and photon qubits are encoded such that single-qubit operations can be easily implemented by using linear optics. Robust optical one-way quantum computation can be performed since cluster states can be stored in atoms and then transferred to photons that can be easily operated and measured. Therefore, this proposal could help in performing robust large-scale optical one-way quantum computation.

  17. Efficient quantum circuits for one-way quantum computing.

    Science.gov (United States)

    Tanamoto, Tetsufumi; Liu, Yu-Xi; Hu, Xuedong; Nori, Franco

    2009-03-13

    While Ising-type interactions are ideal for implementing controlled phase flip gates in one-way quantum computing, natural interactions between solid-state qubits are most often described by either the XY or the Heisenberg models. We show an efficient way of generating cluster states directly using either the imaginary SWAP (iSWAP) gate for the XY model, or the sqrt[SWAP] gate for the Heisenberg model. Our approach thus makes one-way quantum computing more feasible for solid-state devices.

  18. One-way quantum computing in superconducting circuits

    Science.gov (United States)

    Albarrán-Arriagada, F.; Alvarado Barrios, G.; Sanz, M.; Romero, G.; Lamata, L.; Retamal, J. C.; Solano, E.

    2018-03-01

    We propose a method for the implementation of one-way quantum computing in superconducting circuits. Measurement-based quantum computing is a universal quantum computation paradigm in which an initial cluster state provides the quantum resource, while the iteration of sequential measurements and local rotations encodes the quantum algorithm. Up to now, technical constraints have limited a scalable approach to this quantum computing alternative. The initial cluster state can be generated with available controlled-phase gates, while the quantum algorithm makes use of high-fidelity readout and coherent feedforward. With current technology, we estimate that quantum algorithms with above 20 qubits may be implemented in the path toward quantum supremacy. Moreover, we propose an alternative initial state with properties of maximal persistence and maximal connectedness, reducing the required resources of one-way quantum computing protocols.

  19. A fault-tolerant one-way quantum computer

    International Nuclear Information System (INIS)

    Raussendorf, R.; Harrington, J.; Goyal, K.

    2006-01-01

    We describe a fault-tolerant one-way quantum computer on cluster states in three dimensions. The presented scheme uses methods of topological error correction resulting from a link between cluster states and surface codes. The error threshold is 1.4% for local depolarizing error and 0.11% for each source in an error model with preparation-, gate-, storage-, and measurement errors

  20. One-way EPR steering and genuine multipartite EPR steering

    Science.gov (United States)

    He, Qiongyi; Reid, Margaret D.

    2012-11-01

    We propose criteria and experimental strategies to realise the Einstein-Podolsky-Rosen (EPR) steering nonlocality. One-way steering can be obtained where there is asymmetry of thermal noise on each system. We also present EPR steering inequalities that act as signatures and suggest how to optimise EPR correlations in specific schemes so that the genuine multipartite EPR steering nonlocality (EPR paradox) can also possibly be realised. The results presented here also apply to the spatially separated macroscopic atomic ensembles.

  1. One-way Ponderomotive Barrier in a Uniform Magnetic Field

    International Nuclear Information System (INIS)

    Dodin, I.Y.; Fisch, N.J.

    2005-01-01

    The possibility of an asymmetric ponderomotive barrier in a nonuniform dc magnetic field by high-frequency radiation near the cyclotron resonance for selected plasma species was contemplated in Physics of Plasmas 11 (November 2004) 5046-5064. Here we show that a similar one-way barrier, which reflects particles incident from one side while transmitting those incident from the opposite side, can be produced also in a uniform magnetic field, entirely due to inhomogeneity of high-frequency drive

  2. Modified one-way coupled map lattices as communication cryptosystems

    International Nuclear Information System (INIS)

    Zhao Mingchao; Li Kezan; Fu Xinchu

    2009-01-01

    In this paper, we modify the original communication cryptosystem based on OCML (one-way coupled map lattices), and present a modified OCML communication cryptosystem. The modified OCML communication cryptosystem is shown to have some additional advantages compared to the original one, e.g., it has a larger parameter space, and is more capable of anti-error analysis. And, we apply this modified OCML communication cryptosystem for multiplex OCML communication.

  3. Fundamentals of universality in one-way quantum computation

    International Nuclear Information System (INIS)

    Nest, M van den; Duer, W; Miyake, A; Briegel, H J

    2007-01-01

    In this paper, we build a framework allowing for a systematic investigation of the fundamental issue: 'Which quantum states serve as universal resources for measurement-based (one-way) quantum computation?' We start our study by re-examining what is exactly meant by 'universality' in quantum computation, and what the implications are for universal one-way quantum computation. Given the framework of a measurement-based quantum computer, where quantum information is processed by local operations only, we find that the most general universal one-way quantum computer is one which is capable of accepting arbitrary classical inputs and producing arbitrary quantum outputs-we refer to this property as CQ-universality. We then show that a systematic study of CQ-universality in one-way quantum computation is possible by identifying entanglement features that are required to be present in every universal resource. In particular, we find that a large class of entanglement measures must reach its supremum on every universal resource. These insights are used to identify several families of states as being not universal, such as one-dimensional (1D) cluster states, Greenberger-Horne-Zeilinger (GHZ) states, W states, and ground states of non-critical 1D spin systems. Our criteria are strengthened by considering the efficiency of a quantum computation, and we find that entanglement measures must obey a certain scaling law with the system size for all efficient universal resources. This again leads to examples of non-universal resources, such as, e.g. ground states of critical 1D spin systems. On the other hand, we provide several examples of efficient universal resources, namely graph states corresponding to hexagonal, triangular and Kagome lattices. Finally, we consider the more general notion of encoded CQ-universality, where quantum outputs are allowed to be produced in an encoded form. Again we provide entanglement-based criteria for encoded universality. Moreover, we present a

  4. One-way spatial integration of hyperbolic equations

    Science.gov (United States)

    Towne, Aaron; Colonius, Tim

    2015-11-01

    In this paper, we develop and demonstrate a method for constructing well-posed one-way approximations of linear hyperbolic systems. We use a semi-discrete approach that allows the method to be applied to a wider class of problems than existing methods based on analytical factorization of idealized dispersion relations. After establishing the existence of an exact one-way equation for systems whose coefficients do not vary along the axis of integration, efficient approximations of the one-way operator are constructed by generalizing techniques previously used to create nonreflecting boundary conditions. When physically justified, the method can be applied to systems with slowly varying coefficients in the direction of integration. To demonstrate the accuracy and computational efficiency of the approach, the method is applied to model problems in acoustics and fluid dynamics via the linearized Euler equations; in particular we consider the scattering of sound waves from a vortex and the evolution of hydrodynamic wavepackets in a spatially evolving jet. The latter problem shows the potential of the method to offer a systematic, convergent alternative to ad hoc regularizations such as the parabolized stability equations.

  5. A one-way text messaging intervention for obesity.

    Science.gov (United States)

    Ahn, Ahleum; Choi, Jaekyung

    2016-04-01

    Worldwide, there has been a startling increase in the number of people who are obese or overweight. Obesity increases the risk of cardiovascular disease and overall mortality. Mobile phone messaging is an important means of human communication globally. Because the mobile phone can be used anywhere at any time, mobile phone messaging has the potential to manage obesity. We investigated the effectiveness of a one-way text messaging intervention for obesity. Participants' body mass index and waist circumference were measured at the beginning of the programme and again after 12 weeks. The text message group received text messages about exercise, dietary intake, and general information about obesity three times a week, while the control group did not receive any text messages from the study. Of the 80 participants, 25 subjects in the text message group and 29 participants in the control group completed the study. After adjusting for baseline body mass index, the body mass index was significantly lower in the text message group than in the control group (27.9 vs. 28.3; p = 0.02). After adjusting for the baseline waist circumference, the difference of waist circumference between the text message group and control group was not significant (93.4 vs. 94.6; p = 0.13). The one-way text messaging intervention was a simple and effective way to manage obesity. The one-way text messaging intervention may be a useful method for lifestyle modification in obese subjects. © The Author(s) 2015.

  6. One-way entangled-photon autocompensating quantum cryptography

    Science.gov (United States)

    Walton, Zachary D.; Abouraddy, Ayman F.; Sergienko, Alexander V.; Saleh, Bahaa E.; Teich, Malvin C.

    2003-06-01

    A quantum cryptography implementation is presented that uses entanglement to combine one-way operation with an autocompensating feature that has hitherto only been available in implementations that require the signal to make a round trip between the users. Using the concept of advanced waves, it is shown that this proposed implementation is related to the round-trip implementation in the same way that Ekert’s two-particle scheme is related to the original one-particle scheme of Bennett and Brassard. The practical advantages and disadvantages of the proposed implementation are discussed in the context of existing schemes.

  7. One-way entangled-photon autocompensating quantum cryptography

    International Nuclear Information System (INIS)

    Walton, Zachary D.; Abouraddy, Ayman F.; Sergienko, Alexander V.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2003-01-01

    A quantum cryptography implementation is presented that uses entanglement to combine one-way operation with an autocompensating feature that has hitherto only been available in implementations that require the signal to make a round trip between the users. Using the concept of advanced waves, it is shown that this proposed implementation is related to the round-trip implementation in the same way that Ekert's two-particle scheme is related to the original one-particle scheme of Bennett and Brassard. The practical advantages and disadvantages of the proposed implementation are discussed in the context of existing schemes

  8. Experimental all-optical one-way quantum computing

    International Nuclear Information System (INIS)

    Prevedel, R.

    2009-01-01

    In recent years, the relatively new field of quantum information processing (QIP) has attracted the attention of many scientists around the world due to its promise of increased computational speed, absolute secure communication and the potential to simulate complex quantum mechanical systems. The very essence of this new quantum information technology are two concepts at the very heart of quantum mechanics, namely superposition and entanglement. The present Thesis contains the results of four different experiments that were all aimed at the demonstration of an entirely new model for quantum computing with linear optics, the 'one-way' quantum computer. For this purpose a multi-photon entangled state of four photons has been generated via the process of spontaneous parametric down-conversion and by using an interferometric setup. This entangled state acts as a resource that allowed for novel demonstrations of quantum algorithms and relevant experimental techniques. By exploiting the advances developed in both theory and experiment, in this Thesis we report the implementation of fast, active feed-forward that allowed, for the first time, the realization of deterministic linear optics quantum computing at an unprecedented speed. Further we were able to demonstrate the Deutsch algorithm on our one-way quantum computer, an important quantum algorithm that is capable of distinguishing whether a function is constant or balanced. Classically one needs to query the algorithm at least 2N/2 + 1 times for an N-bit binary input string, however, in the quantum regime, this can be done with one evaluation of the algorithm, independent of the size of the input. In another experiment we succeeded in playing an instance of a quantum game - the so-called Prisoner's dilemma - on our one-way quantum computer. Playing such a game is essentially the execution of a quantum algorithm made up of a distinct set of one- and two-qubit gates. This allows the individual players to increase their

  9. Acoustic topological insulator and robust one-way sound transport

    Science.gov (United States)

    He, Cheng; Ni, Xu; Ge, Hao; Sun, Xiao-Chen; Chen, Yan-Bin; Lu, Ming-Hui; Liu, Xiao-Ping; Chen, Yan-Feng

    2016-12-01

    Topological design of materials enables topological symmetries and facilitates unique backscattering-immune wave transport. In airborne acoustics, however, the intrinsic longitudinal nature of sound polarization makes the use of the conventional spin-orbital interaction mechanism impossible for achieving band inversion. The topological gauge flux is then typically introduced with a moving background in theoretical models. Its practical implementation is a serious challenge, though, due to inherent dynamic instabilities and noise. Here we realize the inversion of acoustic energy bands at a double Dirac cone and provide an experimental demonstration of an acoustic topological insulator. By manipulating the hopping interaction of neighbouring ’atoms’ in this new topological material, we successfully demonstrate the acoustic quantum spin Hall effect, characterized by robust pseudospin-dependent one-way edge sound transport. Our results are promising for the exploration of new routes for experimentally studying topological phenomena and related applications, for example, sound-noise reduction.

  10. Observation of one-way Einstein-Podolsky-Rosen steering

    Science.gov (United States)

    Händchen, Vitus; Eberle, Tobias; Steinlechner, Sebastian; Samblowski, Aiko; Franz, Torsten; Werner, Reinhard F.; Schnabel, Roman

    2012-09-01

    The distinctive non-classical features of quantum physics were first discussed in the seminal paper by A. Einstein, B. Podolsky and N. Rosen (EPR) in 1935. In his immediate response, E. Schrödinger introduced the notion of entanglement, now seen as the essential resource in quantum information as well as in quantum metrology. Furthermore, he showed that at the core of the EPR argument is a phenomenon that he called steering. In contrast to entanglement and violations of Bell's inequalities, steering implies a direction between the parties involved. Recent theoretical works have precisely defined this property, but the question arose as to whether there are bipartite states showing steering only in one direction. Here, we present an experimental realization of two entangled Gaussian modes of light that in fact shows the steering effect in one direction but not in the other. The generated one-way steering gives a new insight into quantum physics and may open a new field of applications in quantum information.

  11. Mathematical investigation of one-way transform matrix options

    International Nuclear Information System (INIS)

    Cooper, James Arlin

    2006-01-01

    One-way transforms have been used in weapon systems processors since the mid- to late-1970s in order to help recognize insertion of correct pre-arm information while maintaining abnormal-environment safety. Level-One, Level-Two, and Level-Three transforms have been designed. The Level-One and Level-Two transforms have been implemented in weapon systems, and both of these transforms are equivalent to matrix multiplication applied to the inserted information. The Level-Two transform, utilizing a 6 x 6 matrix, provided the basis for the ''System 2'' interface definition for Unique-Signal digital communication between aircraft and attached weapons. The investigation described in this report was carried out to find out if there were other size matrices that would be equivalent to the 6 x 6 Level-Two matrix. One reason for the investigation was to find out whether or not other dimensions were possible, and if so, to derive implementation options. Another important reason was to more fully explore the potential for inadvertent inversion. The results were that additional implementation methods were discovered, but no inversion weaknesses were revealed

  12. The Laguerre finite difference one-way equation solver

    Science.gov (United States)

    Terekhov, Andrew V.

    2017-05-01

    This paper presents a new finite difference algorithm for solving the 2D one-way wave equation with a preliminary approximation of a pseudo-differential operator by a system of partial differential equations. As opposed to the existing approaches, the integral Laguerre transform instead of Fourier transform is used. After carrying out the approximation of spatial variables it is possible to obtain systems of linear algebraic equations with better computing properties and to reduce computer costs for their solution. High accuracy of calculations is attained at the expense of employing finite difference approximations of higher accuracy order that are based on the dispersion-relationship-preserving method and the Richardson extrapolation in the downward continuation direction. The numerical experiments have verified that as compared to the spectral difference method based on Fourier transform, the new algorithm allows one to calculate wave fields with a higher degree of accuracy and a lower level of numerical noise and artifacts including those for non-smooth velocity models. In the context of solving the geophysical problem the post-stack migration for velocity models of the types Syncline and Sigsbee2A has been carried out. It is shown that the images obtained contain lesser noise and are considerably better focused as compared to those obtained by the known Fourier Finite Difference and Phase-Shift Plus Interpolation methods. There is an opinion that purely finite difference approaches do not allow carrying out the seismic migration procedure with sufficient accuracy, however the results obtained disprove this statement. For the supercomputer implementation it is proposed to use the parallel dichotomy algorithm when solving systems of linear algebraic equations with block-tridiagonal matrices.

  13. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  14. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    International Nuclear Information System (INIS)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar

    2011-01-01

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  15. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.

    Science.gov (United States)

    Scarani, Valerio; Renner, Renato

    2008-05-23

    We derive a bound for the security of quantum key distribution with finite resources under one-way postprocessing, based on a definition of security that is composable and has an operational meaning. While our proof relies on the assumption of collective attacks, unconditional security follows immediately for standard protocols such as Bennett-Brassard 1984 and six-states protocol. For single-qubit implementations of such protocols, we find that the secret key rate becomes positive when at least N approximately 10(5) signals are exchanged and processed. For any other discrete-variable protocol, unconditional security can be obtained using the exponential de Finetti theorem, but the additional overhead leads to very pessimistic estimates.

  16. Constructing a one-way hash function based on the unified chaotic system

    International Nuclear Information System (INIS)

    Long Min; Peng Fei; Chen Guanrong

    2008-01-01

    A new one-way hash function based on the unified chaotic system is constructed. With different values of a key parameter, the unified chaotic system represents different chaotic systems, based on which the one-way hash function algorithm is constructed with three round operations and an initial vector on an input message. In each round operation, the parameters are processed by three different chaotic systems generated from the unified chaotic system. Feed-forwards are used at the end of each round operation and at the end of each element of the message processing. Meanwhile, in each round operation, parameter-exchanging operations are implemented. Then, the hash value of length 160 bits is obtained from the last six parameters. Simulation and analysis both demonstrate that the algorithm has great flexibility, satisfactory hash performance, weak collision property, and high security. (general)

  17. Key rate of quantum key distribution with hashed two-way classical communication

    International Nuclear Information System (INIS)

    Watanabe, Shun; Matsumoto, Ryutaroh; Uyematsu, Tomohiko; Kawano, Yasuhito

    2007-01-01

    We propose an information reconciliation protocol that uses two-way classical communication. The key rates of quantum key distribution (QKD) protocols that use our protocol are higher than those using previously known protocols for a wide range of error rates for the Bennett-Brassard 1984 and six-state protocols. We also clarify the relation between the proposed and known QKD protocols, and the relation between the proposed protocol and entanglement distillation protocols

  18. One-way hash function construction based on the spatiotemporal chaotic system

    International Nuclear Information System (INIS)

    Luo Yu-Ling; Du Ming-Hui

    2012-01-01

    Based on the spatiotemporal chaotic system, a novel algorithm for constructing a one-way hash function is proposed and analysed. The message is divided into fixed length blocks. Each message block is processed by the hash compression function in parallel. The hash compression is constructed based on the spatiotemporal chaos. In each message block, the ASCII code and its position in the whole message block chain constitute the initial conditions and the key of the hash compression function. The final hash value is generated by further compressing the mixed result of all the hash compression values. Theoretic analyses and numerical simulations show that the proposed algorithm presents high sensitivity to the message and key, good statistical properties, and strong collision resistance. (general)

  19. Exact Markov chain and approximate diffusion solution for haploid genetic drift with one-way mutation.

    Science.gov (United States)

    Hössjer, Ola; Tyvand, Peder A; Miloh, Touvia

    2016-02-01

    The classical Kimura solution of the diffusion equation is investigated for a haploid random mating (Wright-Fisher) model, with one-way mutations and initial-value specified by the founder population. The validity of the transient diffusion solution is checked by exact Markov chain computations, using a Jordan decomposition of the transition matrix. The conclusion is that the one-way diffusion model mostly works well, although the rate of convergence depends on the initial allele frequency and the mutation rate. The diffusion approximation is poor for mutation rates so low that the non-fixation boundary is regular. When this happens we perturb the diffusion solution around the non-fixation boundary and obtain a more accurate approximation that takes quasi-fixation of the mutant allele into account. The main application is to quantify how fast a specific genetic variant of the infinite alleles model is lost. We also discuss extensions of the quasi-fixation approach to other models with small mutation rates. Copyright © 2015 Elsevier Inc. All rights reserved.

  20. Experimental realization of a one-way quantum computer algorithm solving Simon's problem.

    Science.gov (United States)

    Tame, M S; Bell, B A; Di Franco, C; Wadsworth, W J; Rarity, J G

    2014-11-14

    We report an experimental demonstration of a one-way implementation of a quantum algorithm solving Simon's problem-a black-box period-finding problem that has an exponential gap between the classical and quantum runtime. Using an all-optical setup and modifying the bases of single-qubit measurements on a five-qubit cluster state, key representative functions of the logical two-qubit version's black box can be queried and solved. To the best of our knowledge, this work represents the first experimental realization of the quantum algorithm solving Simon's problem. The experimental results are in excellent agreement with the theoretical model, demonstrating the successful performance of the algorithm. With a view to scaling up to larger numbers of qubits, we analyze the resource requirements for an n-qubit version. This work helps highlight how one-way quantum computing provides a practical route to experimentally investigating the quantum-classical gap in the query complexity model.

  1. Relay Selection and Resource Allocation in One-Way and Two-Way Cognitive Relay Networks

    KAUST Repository

    Alsharoa, Ahmad M.

    2013-05-08

    In this work, the problem of relay selection and resource power allocation in one- way and two-way cognitive relay networks using half duplex channels with different relaying protocols is investigated. Optimization problems for both single and multiple relay selection that maximize the sum rate of the secondary network without degrading the quality of service of the primary network by respecting a tolerated interference threshold were formulated. Single relay selection and optimal power allocation for two-way relaying cognitive radio networks using decode-and-forward and amplify-and-forward protocols were studied. Dual decomposition and subgradient methods were used to find the optimal power allocation. The transmission process to exchange two different messages between two transceivers for two-way relaying technique takes place in two time slots. In the first slot, the transceivers transmit their signals simultaneously to the relay. Then, during the second slot the relay broadcasts its signal to the terminals. Moreover, improvement of both spectral and energy efficiency can be achieved compared with the one-way relaying technique. As an extension, a multiple relay selection for both one-way and two-way relaying under cognitive radio scenario using amplify-and-forward were discussed. A strong optimization tool based on genetic and iterative algorithms was employed to solve the 
formulated optimization problems for both single and multiple relay selection, where discrete relay power levels were considered. Simulation results show that the practical and low-complexity heuristic approaches achieve almost the same performance of the optimal relay selection schemes either with discrete or continuous power distributions while providing a considerable saving in terms of computational complexity.

  2. Tag-KEM from Set Partial Domain One-Way Permutations

    Science.gov (United States)

    Abe, Masayuki; Cui, Yang; Imai, Hideki; Kurosawa, Kaoru

    Recently a framework called Tag-KEM/DEM was introduced to construct efficient hybrid encryption schemes. Although it is known that generic encode-then-encrypt construction of chosen ciphertext secure public-key encryption also applies to secure Tag-KEM construction and some known encoding method like OAEP can be used for this purpose, it is worth pursuing more efficient encoding method dedicated for Tag-KEM construction. This paper proposes an encoding method that yields efficient Tag-KEM schemes when combined with set partial one-way permutations such as RSA and Rabin's encryption scheme. To our knowledge, this leads to the most practical hybrid encryption scheme of this type. We also present an efficient Tag-KEM which is CCA-secure under general factoring assumption rather than Blum factoring assumption.

  3. One-Way Fluid-Structure Interaction Simulation of an Offshore Wind Turbine

    Directory of Open Access Journals (Sweden)

    Zhi-Kui Wang

    2014-07-01

    Full Text Available The Fluid-Structure Interaction (FSI has gained great interest of scholars recently, meanwhile, extensive studies have been conducted by the virtue of numerical methods which have been implemented on wind turbine models. The blades of a wind turbine have been gained a deep insight into the FSI analyses, however, few studies have been conducted on the tower and nacelle, which are key components of the wind turbine, using this method. We performed the one-way FSI analysis on a 2-MW offshore wind turbine, using the Finite Volume Method (FVM with ANSYS CFX solver and the RNG k-ε turbulence model, to achieve a comprehensive cognition of it. The grid convergence was studied and verified in this study, and the torque value is chosen to determine the optimal case. The superior case, which was chosen to conduct the FSI analysis, with a relative error is only 2.15%, thus, the accuracy of results is credible.

  4. Experimental demonstration of deterministic one-way quantum computing on a NMR quantum computer

    OpenAIRE

    Ju, Chenyong; Zhu, Jing; Peng, Xinhua; Chong, Bo; Zhou, Xianyi; Du, Jiangfeng

    2008-01-01

    One-way quantum computing is an important and novel approach to quantum computation. By exploiting the existing particle-particle interactions, we report the first experimental realization of the complete process of deterministic one-way quantum Deutsch-Josza algorithm in NMR, including graph state preparation, single-qubit measurements and feed-forward corrections. The findings in our experiment may shed light on the future scalable one-way quantum computation.

  5. Secret-key rates and privacy leakage in biometric systems

    NARCIS (Netherlands)

    Ignatenko, T.

    2009-01-01

    In this thesis both the generation of secret keys from biometric data and the binding of secret keys to biometric data are investigated. These secret keys can be used to regulate access to sensitive data, services, and environments. In a biometric secrecy system a secret key is generated or chosen

  6. One-Way Functions and Composition of Conjugacy and Discrete Logarithm Problems in the Small Cancellation Groups

    Directory of Open Access Journals (Sweden)

    N. V. Bezverkhniy

    2015-01-01

    Full Text Available The paper considers the possibility for building a one-way function in the small cancellation group. Thus, it uses the algorithm to solve the problem for a cyclic subgroup, also known as a discrete logarithm problem, and the algorithm to solve the word problem in this class of groups.Research is conducted using geometric methods of combinatorial group theory (the method of diagrams in groups.In public channel exchange of information are used one-way functions, direct calculation of which should be much less complicated than the calculation of the inverse function. The paper considers the combination of two problems: discrete logarithms and conjugacy. This leads to the problem of conjugate membership for a cyclic subgroup. The work proposes an algorithm based on this problem, which can be used as a basis in investigation of the appropriate one-way function for its fitness to build a public key distribution scheme.The study used doughnut charts of word conjugacy, and for one special class of such charts has been proven a property of the layer-based periodicity. The presence of such properties is obviously leads to a solution of the power conjugacy of words in the considered class of groups. Unfortunately, this study failed to show any periodicity of a doughnut chart, but for one of two possible classes this periodicity has been proven.The building process of one-way function considered in the paper was studied in terms of possibility to calculate both direct and inverse mappings. The computational complexity was not considered. Thus, the following two tasks were yet unresolved: determining the quality of one-way function in the above protocol of the public key distribution and completing the study of the periodicity of doughnut charts of word conjugacy, leading to a positive solution of the power conjugacy of words in the class groups under consideration.

  7. A Novel Through Capacity Model for One-way Channel Based on Characteristics of the Vessel Traffic Flow

    Directory of Open Access Journals (Sweden)

    Yuanyuan Nie

    2017-09-01

    Full Text Available Vessel traffic flow is a key parameter for channel-through capacity and is of great significance to vessel traffic management, channel and port design and navigational risk evaluation. Based on the study of parameters of characteristics of vessel traffic flow related to channel-through capacity, this paper puts forward a brand-new mathematical model for one-way channel-through capacity in which parameters of channel length, vessel arrival rate and velocity difference in different vessels are involved and a theoretical calculating mechanism for the channel-through capacity is provided. In order to verify availability and reliability of the model, extensive simulation studies have been carried out and based on the historical AIS data, an analytical case study on the Xiazhimen Channel validating the proposed model is presented. Both simulation studies and the case study show that the proposed model is valid and all relative parameters can be readjusted and optimized to further improve the channel-through capacity. Thus, all studies demonstrate that the model is valuable for channel design and vessel management.

  8. One-way membrane trafficking of SOS in receptor-triggered Ras activation.

    Science.gov (United States)

    Christensen, Sune M; Tu, Hsiung-Lin; Jun, Jesse E; Alvarez, Steven; Triplet, Meredith G; Iwig, Jeffrey S; Yadav, Kamlesh K; Bar-Sagi, Dafna; Roose, Jeroen P; Groves, Jay T

    2016-09-01

    SOS is a key activator of the small GTPase Ras. In cells, SOS-Ras signaling is thought to be initiated predominantly by membrane recruitment of SOS via the adaptor Grb2 and balanced by rapidly reversible Grb2-SOS binding kinetics. However, SOS has multiple protein and lipid interactions that provide linkage to the membrane. In reconstituted-membrane experiments, these Grb2-independent interactions were sufficient to retain human SOS on the membrane for many minutes, during which a single SOS molecule could processively activate thousands of Ras molecules. These observations raised questions concerning how receptors maintain control of SOS in cells and how membrane-recruited SOS is ultimately released. We addressed these questions in quantitative assays of reconstituted SOS-deficient chicken B-cell signaling systems combined with single-molecule measurements in supported membranes. These studies revealed an essentially one-way trafficking process in which membrane-recruited SOS remains trapped on the membrane and continuously activates Ras until being actively removed via endocytosis.

  9. One-way optical transmission in silicon photonic crystal heterojunction with circular and square scatterers

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Dan, E-mail: liudanhu725@126.com [School of Physics and Mechanical & Electrical Engineering, Hubei University of Education, Wuhan, 430205 (China); Hu, Sen [School of Physics and Mechanical & Electrical Engineering, Hubei University of Education, Wuhan, 430205 (China); Gao, Yihua [Wuhan National Laboratory for Optoelectronics (WNLO), School of Physics, Huazhong University of Science and Technology (HUST), Wuhan, 430074 (China)

    2017-07-12

    A 2D orthogonal square-lattice photonic crystal (PC) heterojunction consisting of circular and square air holes in silicon is presented. Band structures are calculated using the plane wave expansion method, and the transmission properties are investigated by the finite-different time-domain simulations. Thanks to the higher diffraction orders excited when the circular and square holes are interlaced along the interface, one-way transmission phenomena can exist within wide frequency regions. The higher order diffraction is further enhanced through two different interface optimization designs proposed by modifying the PC structure of the hetero-interface. An orthogonal PC heterojunction for wide-band and efficient one-way transmission is constructed, and the maximum transmissivity is up to 78%. - Highlights: • Photonic crystal heterojunction with circular and square scatterers is first studied. • One-way transmission efficiency is closely related to the hetero-interface. • Wide-band and efficient one-way transmission is realized.

  10. Relay Selection and Resource Allocation in One-Way and Two-Way Cognitive Relay Networks

    KAUST Repository

    Alsharoa, Ahmad M.

    2013-01-01

    In this work, the problem of relay selection and resource power allocation in one- way and two-way cognitive relay networks using half duplex channels with different relaying protocols is investigated. Optimization problems for both single

  11. Detection technology research on the one-way clutch of automatic brake adjuster

    Science.gov (United States)

    Jiang, Wensong; Luo, Zai; Lu, Yi

    2013-10-01

    In this article, we provide a new testing method to evaluate the acceptable quality of the one-way clutch of automatic brake adjuster. To analysis the suitable adjusting brake moment which keeps the automatic brake adjuster out of failure, we build a mechanical model of one-way clutch according to the structure and the working principle of one-way clutch. The ranges of adjusting brake moment both clockwise and anti-clockwise can be calculated through the mechanical model of one-way clutch. Its critical moment, as well, are picked up as the ideal values of adjusting brake moment to evaluate the acceptable quality of one-way clutch of automatic brake adjuster. we calculate the ideal values of critical moment depending on the different structure of one-way clutch based on its mechanical model before the adjusting brake moment test begin. In addition, an experimental apparatus, which the uncertainty of measurement is ±0.1Nm, is specially designed to test the adjusting brake moment both clockwise and anti-clockwise. Than we can judge the acceptable quality of one-way clutch of automatic brake adjuster by comparing the test results and the ideal values instead of the EXP. In fact, the evaluation standard of adjusting brake moment applied on the project are still using the EXP provided by manufacturer currently in China, but it would be unavailable when the material of one-way clutch changed. Five kinds of automatic brake adjusters are used in the verification experiment to verify the accuracy of the test method. The experimental results show that the experimental values of adjusting brake moment both clockwise and anti-clockwise are within the ranges of theoretical results. The testing method provided by this article vividly meet the requirements of manufacturer's standard.

  12. Demonstration of Multisetting One-Way Einstein-Podolsky-Rosen Steering in Two-Qubit Systems

    Science.gov (United States)

    Xiao, Ya; Ye, Xiang-Jun; Sun, Kai; Xu, Jin-Shi; Li, Chuan-Feng; Guo, Guang-Can

    2017-04-01

    Einstein-Podolsky-Rosen (EPR) steering describes the ability of one party to remotely affect another's state through local measurements. One of the most distinguishable properties of EPR steering is its asymmetric aspect. Steering can work in one direction but fail in the opposite direction. This type of one-way steering, which is different from the symmetry concepts of entanglement and Bell nonlocality, has garnered much interest. However, an experimental demonstration of genuine one-way EPR steering in the simplest scenario, i.e., one that employs two-qubit systems, is still lacking. In this Letter, we experimentally demonstrate one-way EPR steering with multimeasurement settings for a class of two-qubit states, which are still one-way steerable even with infinite settings. The steerability is quantified by the steering radius, which represents a necessary and sufficient steering criterion. The demonstrated one-way steering in the simplest bipartite quantum system is of fundamental interest and may provide potential applications in one-way quantum information tasks.

  13. Moments Based Framework for Performance Analysis of One-Way/Two-Way CSI-Assisted AF Relaying

    KAUST Repository

    Xia, Minghua

    2012-09-01

    When analyzing system performance of conventional one-way relaying or advanced two-way relaying, these two techniques are always dealt with separately and, thus, their performance cannot be compared efficiently. Moreover, for ease of mathematical tractability, channels considered in such studies are generally assumed to be subject to Rayleigh fading or to be Nakagami-$m$ channels with integer fading parameters, which is impractical in typical urban environments. In this paper, we propose a unified moments-based framework for general performance analysis of channel-state-information (CSI) assisted amplify-and-forward (AF) relaying systems. The framework is applicable to both one-way and two-way relaying over arbitrary Nakagami-$m$ fading channels, and it includes previously reported results as special cases. Specifically, the mathematical framework is firstly developed under the umbrella of the weighted harmonic mean of two Gamma-distributed variables in conjunction with the theory of Pad\\\\\\'e approximants. Then, general expressions for the received signal-to-noise ratios of the users in one-way/two-way relaying systems and the corresponding moments, moment generation function, and cumulative density function are established. Subsequently, the mathematical framework is applied to analyze, compare, and gain insights into system performance of one-way and two-way relaying techniques, in terms of outage probability, average symbol error probability, and achievable data rate. All analytical results are corroborated by simulation results as well as previously reported results whenever available, and they are shown to be efficient tools to evaluate and compare system performance of one-way and two-way relaying.

  14. Performance Analysis of a Forecasting Relocation Model for One-Way Carsharing

    Directory of Open Access Journals (Sweden)

    Ganjar Alfian

    2017-06-01

    Full Text Available A carsharing service can be seen as a transport alternative between private and public transport that enables a group of people to share vehicles based at certain stations. The advanced carsharing service, one-way carsharing, enables customers to return the car to another station. However, one-way implementation generates an imbalanced distribution of cars in each station. Thus, this paper proposes forecasting relocation to solve car distribution imbalances for one-way carsharing services. A discrete event simulation model was developed to help evaluate the proposed model performance. A real case dataset was used to find the best simulation result. The results provide a clear insight into the impact of forecasting relocation on high system utilization and the reservation acceptance ratio compared to traditional relocation methods.

  15. One-Way Deficit and Quantum Phase Transitions in XX Model

    Science.gov (United States)

    Wang, Yao-Kun; Zhang, Yu-Ran

    2018-02-01

    Quantum correlations including entanglement and quantum discord have drawn much attention in characterizing quantum phase transitions. Quantum deficit originates in questions regarding work extraction from quantum systems coupled to a heat bath (Oppenheim et al. Phys. Rev. Lett. 89, 180402, 2002). It links quantum thermodynamics with quantum correlations and provides a new standpoint for understanding quantum non-locality. In this paper, we evaluate the one-way deficit of two adjacent spins in the bulk for the XX model. In the thermodynamic limit, the XX model undergoes a first order transition from fully polarized to a critical phase with quasi-long-range order with decrease of quantum parameter. We find that the one-way deficit becomes nonzero after the critical point. Therefore, the one-way deficit characterizes the quantum phase transition in the XX model.

  16. Joint Preprocesser-Based Detectors for One-Way and Two-Way Cooperative Communication Networks

    KAUST Repository

    Abuzaid, Abdulrahman I.

    2014-05-01

    Efficient receiver designs for cooperative communication networks are becoming increasingly important. In previous work, cooperative networks communicated with the use of L relays. As the receiver is constrained, channel shortening and reduced-rank techniques were employed to design the preprocessing matrix that reduces the length of the received vector from L to U. In the first part of the work, a receiver structure is proposed which combines our proposed threshold selection criteria with the joint iterative optimization (JIO) algorithm that is based on the mean square error (MSE). Our receiver assists in determining the optimal U. Furthermore, this receiver provides the freedom to choose U for each frame depending on the tolerable difference allowed for MSE. Our study and simulation results show that by choosing an appropriate threshold, it is possible to gain in terms of complexity savings while having no or minimal effect on the BER performance of the system. Furthermore, the effect of channel estimation on the performance of the cooperative system is investigated. In the second part of the work, a joint preprocessor-based detector for cooperative communication networks is proposed for one-way and two-way relaying. This joint preprocessor-based detector operates on the principles of minimizing the symbol error rate (SER) instead of minimizing MSE. For a realistic assessment, pilot symbols are used to estimate the channel. From our simulations, it can be observed that our proposed detector achieves the same SER performance as that of the maximum likelihood (ML) detector with all participating relays. Additionally, our detector outperforms selection combining (SC), channel shortening (CS) scheme and reduced-rank techniques when using the same U. Finally, our proposed scheme has the lowest computational complexity.

  17. Experimental realization of a quantum game on a one-way quantum computer

    International Nuclear Information System (INIS)

    Prevedel, Robert; Stefanov, Andre; Walther, Philip; Zeilinger, Anton

    2007-01-01

    We report the first demonstration of a quantum game on an all-optical one-way quantum computer. Following a recent theoretical proposal we implement a quantum version of Prisoner's Dilemma, where the quantum circuit is realized by a four-qubit box-cluster configuration and the player's local strategies by measurements performed on the physical qubits of the cluster. This demonstration underlines the strength and versatility of the one-way model and we expect that this will trigger further interest in designing quantum protocols and algorithms to be tested in state-of-the-art cluster resources

  18. Study of the one-way speed of light anisotropy with particle beams

    Energy Technology Data Exchange (ETDEWEB)

    Wojtsekhowski, Bogdan B. [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States)

    2017-04-01

    Concepts of high precision studies of the one-way speed of light anisotropy are discussed. The high energy particle beam allows measurement of a one-way speed of light anisotropy (SOLA) via analysis of the beam momentum variation with sidereal phase without the use of synchronized clocks. High precision beam position monitors could provide accurate monitoring of the beam orbit and determination of the particle beam momentum with relative accuracy on the level of 10^-10, which corresponds to a limit on SOLA of 10^-18 with existing storage rings. A few additional versions of the experiment are also presented.

  19. Accuracy & Computational Considerations for Wide--Angle One--way Seismic Propagators and Multiple Scattering by Invariant Embedding

    Science.gov (United States)

    Thomson, C. J.

    2004-12-01

    Pseudodifferential operators (PSDOs) yield in principle exact one--way seismic wave equations, which are attractive both conceptually and for their promise of computational efficiency. The one--way operators can be extended to include multiple--scattering effects, again in principle exactly. In practice approximations must be made and, as an example, the variable--wavespeed Helmholtz equation for scalar waves in two space dimensions is here factorized to give the one--way wave equation. This simple case permits clear identification of a sequence of physically reasonable approximations to be used when the mathematically exact PSDO one--way equation is implemented on a computer. As intuition suggests, these approximations hinge on the medium gradients in the direction transverse to the main propagation direction. A key point is that narrow--angle approximations are to be avoided in the interests of accuracy. Another key consideration stems from the fact that the so--called ``standard--ordering'' PSDO indicates how lateral interpolation of the velocity structure can significantly reduce computational costs associated with the Fourier or plane--wave synthesis lying at the heart of the calculations. The decision on whether a slow or a fast Fourier transform code should be used rests upon how many lateral model parameters are truly distinct. A third important point is that the PSDO theory shows what approximations are necessary in order to generate an exponential one--way propagator for the laterally varying case, representing the intuitive extension of classical integral--transform solutions for a laterally homogeneous medium. This exponential propagator suggests the use of larger discrete step sizes, and it can also be used to approach phase--screen like approximations (though the latter are not the main interest here). Numerical comparisons with finite--difference solutions will be presented in order to assess the approximations being made and to gain an understanding

  20. Comparative analysis of the performance of One-Way and Two-Way urban road networks

    Science.gov (United States)

    Gheorghe, Carmen

    2017-10-01

    The fact that the number of vehicles is increasing year after year represents a challenge in road traffic management because it is necessary to adjust the road traffic, in order to prevent any incidents, using mostly the same road infrastructure. At this moment one-way road network provides efficient traffic flow for vehicles but it is not ideal for pedestrians. Therefore, a proper solution must be found and applied when and where it is necessary. Replacing one-way road network with two-way road network may be a viable solution especially if in the area is high pedestrian traffic. The paper aims to highlight the influence of both, one-way and two-way urban road networks through an experimental research which was performed by using traffic data collected in the field. Each of the two scenarios analyzed were based on the same traffic data, the same geometrical conditions of the road (lane width, total road segment width, road slopes, total length of the road network) and also the same signaling conditions (signalised intersection or roundabout). The analysis which involves two-way scenario reveals changes in the performance parameters like delay average, stops average, delay stop average and vehicle speed average. Based on the values obtained, it was possible to perform a comparative analysis between the real, one-way, scenario and the theoretical, two-way, scenario.

  1. Security analysis of a one-way hash function based on spatiotemporal chaos

    International Nuclear Information System (INIS)

    Wang Shi-Hong; Shan Peng-Yang

    2011-01-01

    The collision and statistical properties of a one-way hash function based on spatiotemporal chaos are investigated. Analysis and simulation results indicate that collisions exist in the original algorithm and, therefore, the original algorithm is insecure and vulnerable. An improved algorithm is proposed to avoid the collisions. (general)

  2. Key requirements for high quality picture-rate conversion.

    NARCIS (Netherlands)

    Cordes, C.N.; Haan, de G.

    2009-01-01

    Past LCD-TV generations suffered from a poor motion portrayal, causing the blurring of moving objects. Hence, various techniques have been implemented to improve their motion portrayal, of which the widespread introduction of motion compensated picture-rate conversion in TV systems is an essential

  3. [Extracorporeal ventriculoatrial shunt with the use of one-way ball valve].

    Science.gov (United States)

    Kubo, Shigeki; Takimoto, Hiroshi; Hosoi, Kazuki; Toyota, Shingo; Takakura, Shuji; Hayashi, Yasuhiro; Ueno, Masato; Morisako, Toshitaka; Karasawa, Jun; Ninaga, Hideo; Yoshimine, Toshiki

    2002-04-01

    We developed a simple system of an "extracorporeal" ventriculoatrial (VA) shunt using a one-way ball valve (Acty valve II, Kaneka Medix) to release the patient from postoperative constraint during the ventricular drainage. The system is constructed in such a way that the ventricular drainage tube is connected to the central venous catheter via a one-way valve. The CSF is regulated by using the valve and is diverted into the systemic circulation as in the conventional ventriculoatrial shunt. After 2 or 3 weeks of CSF diversion through the extracorporeal VA shunt, a ventriculoperitoneal shunt is placed if hydrocephalus is apparent by temporary occlusion of the system. We applied this system to 4 patients with hydrocephalus, and we found it useful and free from adverse effects. The patient was freed from physical constraint involved in conventional ventricular drainage and an effective program of early rehabilitation was able to be started.

  4. On the experimental determination of the one-way speed of light

    International Nuclear Information System (INIS)

    Perez, Israel

    2011-01-01

    In this paper the question of the isotropy of the one-way speed of light is addressed from an experimental perspective. In particular, we analyse two experimental methods commonly used in its determination. The analysis is aimed at clarifying the view that the one-way speed of light cannot be determined by techniques in which physical entities close paths. The procedure employed here will provide epistemological tools so that physicists understand that a direct measurement of the speed not only of light but of any physical entity is by no means trivial. Our results shed light on the physics behind the experiments which may be of interest for both physicists with an elemental knowledge in special relativity and philosophers of science.

  5. On the experimental determination of the one-way speed of light

    Energy Technology Data Exchange (ETDEWEB)

    Perez, Israel, E-mail: cooguion@yahoo.com, E-mail: iperez@cicese.mx [Department of Applied Physics, Optics Division, CICESE, Carretera Ensena da-Tijuana 3918, Zona Playitas, CP 22860, Ensenada, Baja California (Mexico)

    2011-07-15

    In this paper the question of the isotropy of the one-way speed of light is addressed from an experimental perspective. In particular, we analyse two experimental methods commonly used in its determination. The analysis is aimed at clarifying the view that the one-way speed of light cannot be determined by techniques in which physical entities close paths. The procedure employed here will provide epistemological tools so that physicists understand that a direct measurement of the speed not only of light but of any physical entity is by no means trivial. Our results shed light on the physics behind the experiments which may be of interest for both physicists with an elemental knowledge in special relativity and philosophers of science.

  6. True amplitude wave equation migration arising from true amplitude one-way wave equations

    Science.gov (United States)

    Zhang, Yu; Zhang, Guanquan; Bleistein, Norman

    2003-10-01

    One-way wave operators are powerful tools for use in forward modelling and inversion. Their implementation, however, involves introduction of the square root of an operator as a pseudo-differential operator. Furthermore, a simple factoring of the wave operator produces one-way wave equations that yield the same travel times as the full wave equation, but do not yield accurate amplitudes except for homogeneous media and for almost all points in heterogeneous media. Here, we present augmented one-way wave equations. We show that these equations yield solutions for which the leading order asymptotic amplitude as well as the travel time satisfy the same differential equations as the corresponding functions for the full wave equation. Exact representations of the square-root operator appearing in these differential equations are elusive, except in cases in which the heterogeneity of the medium is independent of the transverse spatial variables. Here, we address the fully heterogeneous case. Singling out depth as the preferred direction of propagation, we introduce a representation of the square-root operator as an integral in which a rational function of the transverse Laplacian appears in the integrand. This allows us to carry out explicit asymptotic analysis of the resulting one-way wave equations. To do this, we introduce an auxiliary function that satisfies a lower dimensional wave equation in transverse spatial variables only. We prove that ray theory for these one-way wave equations leads to one-way eikonal equations and the correct leading order transport equation for the full wave equation. We then introduce appropriate boundary conditions at z = 0 to generate waves at depth whose quotient leads to a reflector map and an estimate of the ray theoretical reflection coefficient on the reflector. Thus, these true amplitude one-way wave equations lead to a 'true amplitude wave equation migration' (WEM) method. In fact, we prove that applying the WEM imaging condition

  7. Acoustic one-way mode conversion and transmission by sonic crystal waveguides

    Science.gov (United States)

    Ouyang, Shiliang; He, Hailong; He, Zhaojian; Deng, Ke; Zhao, Heping

    2016-09-01

    We proposed a scheme to achieve one-way acoustic propagation and even-odd mode switching in two mutually perpendicular sonic crystal waveguides connected by a resonant cavity. The even mode in the entrance waveguide is able to switch to the odd mode in the exit waveguide through a symmetry match between the cavity resonant modes and the waveguide modes. Conversely, the odd mode in the exit waveguide is unable to be converted into the even mode in the entrance waveguide as incident waves and eigenmodes are mismatched in their symmetries at the waveguide exit. This one-way mechanism can be applied to design an acoustic diode for acoustic integration devices and can be used as a convertor of the acoustic waveguide modes.

  8. Measurement of one-way velocity of light and light-year

    Science.gov (United States)

    Chen, Shao-Guang

    For space science and astronomy the fundamentality of one-way velocity of light (OWVL) is selfevident. The measurement of OWVL (distance / interval) and the clock synchronization with light-signal transfer make a logical circulation. This means that OWVL could not be directly measured but only come indirectly from astronomical method (Romer's Io eclipse and Bradley's sidereal aberration). Furthermore, the light-year by definitional OWVL and the trigonometry distance with AU are also un-measurable. In this report two methods of clock synchronization to solve this problem were proposed: The arriving-time difference of longitudinal-transverse wave (Ts - Tp) or ordinary-extraordinary light (Te - To) is measured by single clock at one end of a dual-speed transmission-line, the signal transmission-delay (from sending-end time Tx to receiving-end time Tp or To) calculated with wave-speed ratio is: (Tp -Tx) = (Ts -Tp) / ((Vp / Vs) - 1) or: (To -Tx) = (Te - To) / ((Vo / Ve ) - 1), where (Vp / Vs) = (E / k) 1/2 is Yang's / shear elastic-modulus ratio obtained by comparing two strains at same stress, (Vo / Ve) = (ne / no) is extraordinary/ordinary light refractive-index ratio obtained by comparing two deflection-angles. Then, two clocks at transmission-line two ends can be synchronized directly to measure the one-way velocity of light and light-year, which work as one earthquakestation with single clock measures first-shake-time and the distance to epicenter. The readings Na and Nb of two counters Ca and Cb with distance L are transferred into a computer C by two leads with transmission-delay Tac and Tbc respectively. The computer progressing subtraction operation exports steady value: (Nb - Na) = f (Ta - Tb ) + f (Tac - Tbc ), where f is the frequency of light-wave always passing Ca and Cb, Ta and Tb are the count-start time of Ca and Cb respectively. From the transmission-delay possess the spatial translational and rotational invariability, the computer exports steady value

  9. One-way hash function based on hyper-chaotic cellular neural network

    International Nuclear Information System (INIS)

    Yang Qunting; Gao Tiegang

    2008-01-01

    The design of an efficient one-way hash function with good performance is a hot spot in modern cryptography researches. In this paper, a hash function construction method based on cell neural network with hyper-chaos characteristics is proposed. First, the chaos sequence is gotten by iterating cellular neural network with Runge–Kutta algorithm, and then the chaos sequence is iterated with the message. The hash code is obtained through the corresponding transform of the latter chaos sequence. Simulation and analysis demonstrate that the new method has the merit of convenience, high sensitivity to initial values, good hash performance, especially the strong stability. (general)

  10. Seismic Imaging, One-Way Wave Equations, Pseudodifferential Operators, Path Integrals, and all that Jazz

    Science.gov (United States)

    Artoun, Ojenie; David-Rus, Diana; Emmett, Matthew; Fishman, Lou; Fital, Sandra; Hogan, Chad; Lim, Jisun; Lushi, Enkeleida; Marinov, Vesselin

    2006-05-01

    In this report we summarize an extension of Fourier analysis for the solution of the wave equation with a non-constant coefficient corresponding to an inhomogeneous medium. The underlying physics of the problem is exploited to link pseudodifferential operators and phase space path integrals to obtain a marching algorithm that incorporates the backward scattering into the evolution of the wave. This allows us to successfully apply single-sweep, one-way marching methods in inherently two-way environments, which was not achieved before through other methods for this problem.

  11. Behavior of one-way reinforced concrete slabs subjected to fire

    Directory of Open Access Journals (Sweden)

    Said M. Allam

    2013-12-01

    Full Text Available A finite difference analysis was performed to investigate the behavior of one-way reinforced concrete slabs exposed to fire. The objective of the study was to investigate the fire resistance and the fire risk after extinguishing the fire. Firstly, the fire resistance was obtained using the ISO834 standard fire without cooling phase. Secondly, the ISO834 parametric fire with cooling phase was applied to study the effect of cooling time. Accordingly, the critical time for cooling was identified and the corresponding failure time was calculated. Moreover, the maximum risk time which is the time between the fire extinguishing and the collapse of slab was obtained. Sixteen one-way reinforced concrete slabs were considered to study the effect of important parameters namely: the concrete cover thickness; the plaster; and the live load ratio. Equations for heat transfer through the slab thickness were used in the fire resistance calculations. Studying the cooling time revealed that the slabs are still prone to collapse although they were cooled before their fire resistance. Moreover, increasing the concrete cover thickness and the presence of plaster led to an increase in the maximum risk time. However, the variation in the live load ratio has almost no effect on such time.

  12. One-way spatial integration of Navier-Stokes equations: stability of wall-bounded flows

    Science.gov (United States)

    Rigas, Georgios; Colonius, Tim; Towne, Aaron; Beyar, Michael

    2016-11-01

    For three-dimensional flows, questions of stability, receptivity, secondary flows, and coherent structures require the solution of large partial-derivative eigenvalue problems. Reduced-order approximations are thus required for engineering prediction since these problems are often computationally intractable or prohibitively expensive. For spatially slowly evolving flows, such as jets and boundary layers, a regularization of the equations of motion sometimes permits a fast spatial marching procedure that results in a huge reduction in computational cost. Recently, a novel one-way spatial marching algorithm has been developed by Towne & Colonius. The new method overcomes the principle flaw observed in Parabolized Stability Equations (PSE), namely the ad hoc regularization that removes upstream propagating modes. The one-way method correctly parabolizes the flow equations based on estimating, in a computationally efficient way, the local spectrum in each cross-stream plane and an efficient spectral filter eliminates modes with upstream group velocity. Results from the application of the method to wall-bounded flows will be presented and compared with predictions from the full linearized compressible Navier-Stokes equations and PSE.

  13. FVCOM one-way and two-way nesting using ESMF: Development and validation

    Science.gov (United States)

    Qi, Jianhua; Chen, Changsheng; Beardsley, Robert C.

    2018-04-01

    Built on the Earth System Modeling Framework (ESMF), the one-way and two-way nesting methods were implemented into the unstructured-grid Finite-Volume Community Ocean Model (FVCOM). These methods help utilize the unstructured-grid multi-domain nesting of FVCOM with an aim at resolving the multi-scale physical and ecosystem processes. A detail of procedures on implementing FVCOM into ESMF was described. The experiments were made to validate and evaluate the performance of the nested-grid FVCOM system. The first was made for a wave-current interaction case with a two-domain nesting with an emphasis on qualifying a critical need of nesting to resolve a high-resolution feature near the coast and harbor with little loss in computational efficiency. The second was conducted for the pseudo river plume cases to examine the differences in the model-simulated salinity between one-way and two-way nesting approaches and evaluate the performance of mass conservative two-way nesting method. The third was carried out for the river plume case in the realistic geometric domain in Mass Bay, supporting the importance for having the two-way nesting for coastal-estuarine integrated modeling. The nesting method described in this paper has been used in the Northeast Coastal Ocean Forecast System (NECOFS)-a global-regional-coastal nesting FVCOM system that has been placed into the end-to-end forecast and hindcast operations since 2007.

  14. One Way Forward to Beat the Newtonian Habit with a Complexity Perspective on Organisational Change

    Directory of Open Access Journals (Sweden)

    Josie McLean

    2013-10-01

    Full Text Available We face a global crisis of un-sustainability—we need to change trajectory, but have so far displayed a collective inability to do so. This article suggests that one reason for this is our entrenched approach to change, which has inappropriately applied mechanistic Newtonian assumptions to “living” systems. Applying what has been learned about the behaviour of complex adaptive systems, we develop a pragmatic model for students of sustainability, who want to facilitate profound organizational and community change towards sustainability on the ground. Our model, “one way forward”, does not purport to be the only way but one possibility, grounded in a different understanding of the nature and dynamic of change as seen through the lens of complexity. In this way, it challenges more conventional change management practices. One way forward is a model facilitating evolutionary change in a social ecology—one possible expression of a “culture of community self-design” as expressed by Banathy. Its theoretical foundations and its practical application (it is designed for practice both have their source in a systemic view and in the principles that reflect the paradigm of complexity. Four central components of this new model—envisioning, core messages (values, indicators of progress, and experimentation—are explored in more detail.

  15. One-way mode transmission in one-dimensional phononic crystal plates

    Science.gov (United States)

    Zhu, Xuefeng; Zou, Xinye; Liang, Bin; Cheng, Jianchun

    2010-12-01

    We investigate theoretically the band structures of one-dimensional phononic crystal (PC) plates with both antisymmetric and symmetric structures, and show how unidirectional transmission behavior can be obtained for either antisymmetric waves (A modes) or symmetric waves (S modes) by exploiting mode conversion and selection in the linear plate systems. The theoretical approach is illustrated for one PC plate example where unidirectional transmission behavior is obtained in certain frequency bands. Employing harmonic frequency analysis, we numerically demonstrate the one-way mode transmission for the PC plate with finite superlattice by calculating the steady-state displacement fields under A modes source (or S modes source) in forward and backward direction, respectively. The results show that the incident waves from A modes source (or S modes source) are transformed into S modes waves (or A modes waves) after passing through the superlattice in the forward direction and the Lamb wave rejections in the backward direction are striking with a power extinction ratio of more than 1000. The present structure can be easily extended to two-dimensional PC plate and efficiently encourage practical studies of experimental realization which is believed to have much significance for one-way Lamb wave mode transmission.

  16. High speed and adaptable error correction for megabit/s rate quantum key distribution.

    Science.gov (United States)

    Dixon, A R; Sato, H

    2014-12-02

    Quantum Key Distribution is moving from its theoretical foundation of unconditional security to rapidly approaching real world installations. A significant part of this move is the orders of magnitude increases in the rate at which secure key bits are distributed. However, these advances have mostly been confined to the physical hardware stage of QKD, with software post-processing often being unable to support the high raw bit rates. In a complete implementation this leads to a bottleneck limiting the final secure key rate of the system unnecessarily. Here we report details of equally high rate error correction which is further adaptable to maximise the secure key rate under a range of different operating conditions. The error correction is implemented both in CPU and GPU using a bi-directional LDPC approach and can provide 90-94% of the ideal secure key rate over all fibre distances from 0-80 km.

  17. Resource cost results for one-way entanglement distillation and state merging of compound and arbitrarily varying quantum sources

    International Nuclear Information System (INIS)

    Boche, H.; Janßen, G.

    2014-01-01

    We consider one-way quantum state merging and entanglement distillation under compound and arbitrarily varying source models. Regarding quantum compound sources, where the source is memoryless, but the source state an unknown member of a certain set of density matrices, we continue investigations begun in the work of Bjelaković et al. [“Universal quantum state merging,” J. Math. Phys. 54, 032204 (2013)] and determine the classical as well as entanglement cost of state merging. We further investigate quantum state merging and entanglement distillation protocols for arbitrarily varying quantum sources (AVQS). In the AVQS model, the source state is assumed to vary in an arbitrary manner for each source output due to environmental fluctuations or adversarial manipulation. We determine the one-way entanglement distillation capacity for AVQS, where we invoke the famous robustification and elimination techniques introduced by Ahlswede. Regarding quantum state merging for AVQS we show by example that the robustification and elimination based approach generally leads to suboptimal entanglement as well as classical communication rates

  18. High-Rate Field Demonstration of Large-Alphabet Quantum Key Distribution

    Science.gov (United States)

    2016-10-12

    count rate of Bob’s detectors. In this detector-limited regime , it is advantageous to increase M to encode as much information as possible in each...High- rate field demonstration of large-alphabet quantum key distribution Catherine Lee,1, 2 Darius Bunandar,1 Zheshen Zhang,1 Gregory R. Steinbrecher...October 12, 2016) 2 Quantum key distribution (QKD) enables secure symmetric key exchange for information-theoretically secure com- munication via one-time

  19. One-way ticket” Romanian Migration at the beginning of the 20th century

    Directory of Open Access Journals (Sweden)

    Silvia Bocancea

    2011-12-01

    Full Text Available Unlike the new age of migration that we are experiencing now, the social mobility specific to the end of the 19th century and the beginning of the 20th century may be defined by the expression “one way ticket”; the immigrant, usually a man, used to leave his country of origin and settle for good in his host-country (he did not look for his happiness from state to state, as it happens now. The Romanian migration of that time was directed mainly towards the New World (particularly to the USA, and less to Canada. This paper is an attempt to sketch the image of Romanian emigration by taking into account the peculiarities determined by: emigration causes, geographical predominance, social composition, occupational options in the host-country, and the structure of Romanian immigrant communities.

  20. An experiment to measure the one-way velocity of propagation of electromagnetic radiation

    Science.gov (United States)

    Kolen, P.; Torr, D. G.

    1982-01-01

    An experiment involving commercially available instrumentation to measure the velocity of the earth with respect to absolute space is described. The experiment involves the measurement of the one-way propagation velocity of electromagnetic radiation down a high-quality coaxial cable. It is demonstrated that the experiment is both physically meaningful and exceedingly simple in concept and in implementation. It is shown that with currently available commercial equipment one might expect to detect a threshold value for the component of velocity of the earth's motion with respect to absolute space in the equatorial plane of approximately 10 km/s, which greatly exceeds the velocity resolution required to detect the motion of the solar system with respect to the center of the galaxy.

  1. One-way Hash function construction based on the chaotic map with changeable-parameter

    International Nuclear Information System (INIS)

    Xiao Di; Liao Xiaofeng; Deng Shaojiang

    2005-01-01

    An algorithm for one-way Hash function construction based on the chaotic map with changeable-parameter is proposed in this paper. A piecewise linear chaotic map with changeable-parameter P is chosen, and cipher block chaining mode (CBC) is introduced to ensure that the parameter P in each iteration is dynamically decided by the last-time iteration value and the corresponding message bit in different positions. The final Hash value is obtained by means of the linear transform on the iteration sequence. Theoretical analysis and computer simulation indicate that our algorithm can satisfy all the performance requirements of Hash function in an efficient and flexible manner. It is practicable and reliable, with high potential to be adopted for E-commerce

  2. Pseudospin Dependent One-Way Transmission in Graphene-Based Topological Plasmonic Crystals

    Science.gov (United States)

    Qiu, Pingping; Qiu, Weibin; Ren, Junbo; Lin, Zhili; Wang, Zeyu; Wang, Jia-Xian; Kan, Qiang; Pan, Jiao-Qing

    2018-04-01

    Originating from the investigation of condensed matter states, the concept of quantum Hall effect and quantum spin Hall effect (QSHE) has recently been expanded to other field of physics and engineering, e.g., photonics and phononics, giving rise to strikingly unconventional edge modes immune to scattering. Here, we present the plasmonic analog of QSHE in graphene plasmonic crystal (GPC) in mid-infrared frequencies. The band inversion occurs when deforming the honeycomb lattice GPCs, which further leads to the topological band gaps and pseudospin features of the edge states. By overlapping the band gaps with different topologies, we numerically simulated the pseudospin-dependent one-way propagation of edge states. The designed GPC may find potential applications in the fields of topological plasmonics and trigger the exploration of the technique of the pseudospin multiplexing in high-density nanophotonic integrated circuits.

  3. One-Way Nested Large-Eddy Simulation over the Askervein Hill

    Directory of Open Access Journals (Sweden)

    James D. Doyle

    2009-07-01

    Full Text Available Large-eddy simulation (LES models have been used extensively to study atmospheric boundary layer turbulence over flat surfaces; however, LES applications over topography are less common. We evaluate the ability of an existing model – COAMPS®-LES – to simulate flow over terrain using data from the Askervein Hill Project. A new approach is suggested for the treatment of the lateral boundaries using one-way grid nesting. LES wind profile and speed-up are compared with observations at various locations around the hill. The COAMPS-LES model performs generally well. This case could serve as a useful benchmark for evaluating LES models for applications over topography.

  4. One-way Hash function construction based on the chaotic map with changeable-parameter

    Energy Technology Data Exchange (ETDEWEB)

    Xiao Di [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China) and College of Mechanical Engineering, Chongqing University, Chongqing 400044 (China)]. E-mail: xiaodi_cqu@hotmail.com; Liao Xiaofeng [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China)]. E-mail: xfliao@cqu.edu.cn; Deng Shaojiang [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China)

    2005-04-01

    An algorithm for one-way Hash function construction based on the chaotic map with changeable-parameter is proposed in this paper. A piecewise linear chaotic map with changeable-parameter P is chosen, and cipher block chaining mode (CBC) is introduced to ensure that the parameter P in each iteration is dynamically decided by the last-time iteration value and the corresponding message bit in different positions. The final Hash value is obtained by means of the linear transform on the iteration sequence. Theoretical analysis and computer simulation indicate that our algorithm can satisfy all the performance requirements of Hash function in an efficient and flexible manner. It is practicable and reliable, with high potential to be adopted for E-commerce.

  5. A Hybrid One-Way ANOVA Approach for the Robust and Efficient Estimation of Differential Gene Expression with Multiple Patterns.

    Directory of Open Access Journals (Sweden)

    Mohammad Manir Hossain Mollah

    Full Text Available Identifying genes that are differentially expressed (DE between two or more conditions with multiple patterns of expression is one of the primary objectives of gene expression data analysis. Several statistical approaches, including one-way analysis of variance (ANOVA, are used to identify DE genes. However, most of these methods provide misleading results for two or more conditions with multiple patterns of expression in the presence of outlying genes. In this paper, an attempt is made to develop a hybrid one-way ANOVA approach that unifies the robustness and efficiency of estimation using the minimum β-divergence method to overcome some problems that arise in the existing robust methods for both small- and large-sample cases with multiple patterns of expression.The proposed method relies on a β-weight function, which produces values between 0 and 1. The β-weight function with β = 0.2 is used as a measure of outlier detection. It assigns smaller weights (≥ 0 to outlying expressions and larger weights (≤ 1 to typical expressions. The distribution of the β-weights is used to calculate the cut-off point, which is compared to the observed β-weight of an expression to determine whether that gene expression is an outlier. This weight function plays a key role in unifying the robustness and efficiency of estimation in one-way ANOVA.Analyses of simulated gene expression profiles revealed that all eight methods (ANOVA, SAM, LIMMA, EBarrays, eLNN, KW, robust BetaEB and proposed perform almost identically for m = 2 conditions in the absence of outliers. However, the robust BetaEB method and the proposed method exhibited considerably better performance than the other six methods in the presence of outliers. In this case, the BetaEB method exhibited slightly better performance than the proposed method for the small-sample cases, but the the proposed method exhibited much better performance than the BetaEB method for both the small- and large

  6. One-way functions based on the discrete logarithm problem in the groups meeting conditions C(3-T (6

    Directory of Open Access Journals (Sweden)

    N. V. Bezverkhniy

    2014-01-01

    Full Text Available In this work we are consider a possibility to create schemes of open key distribution in the groups meeting conditions C(3-T(6. Our constructions use the following algorithms.1. The algorithm that solves the membership problem for cyclic subgroups, also known as the discrete logarithm problem.2. The algorithm that solves the word problem in this class of groups.Our approach is based on the geometric methods of combinatorial group theory (the method of diagrams in groups.In a cryptographic scheme based on the open key distribution one-way functions are used, i.e. functions direct calculation of which must be much easier than that of the inverse one. Our task was to construct a one-way function using groups with small cancelation conditions C(3-T(6 and to compare the calculation complexity of this function with the calculation complexity of its inverse.P.W. Shor has shown in the paper that there exists a polynomial algorithm that can be implemented in a quantum computer to solve the discrete logarithm problem in the groups of units of finite fields and the rings of congruences mod n. This stimulated a series of investigations trying to find alternative complicated mathematical problems that can be used for construction of new asymmetric cryptosystems. For example, open key distribution systems based on the conjugacy problem in matrix groups and the braid groups were proposed.In the other papers the constructions used the discrete logarithm problem in the groups of inner automorphisms of semi-direct products of SL(2,Z and Zp and GL(2,Zp and Zp. groups. The paper of E. Sakalauskas, P. Tvarijonas, A. Raulinaitis proposed a scheme that uses a composition of two problems of group theory, namely the conjugacy problem and the discrete logarithm problem.Our results show that the scheme that we propose is of polynomial complexity. Therefore its security is not sufficient for further applications in communications. However the security can be improved

  7. Non-reciprocity and topology in optics: one-way road for light via surface magnon polariton.

    Science.gov (United States)

    Ochiai, Tetsuyuki

    2015-02-01

    We show how non-reciprocity and topology are used to construct an optical one-way waveguide in the Voigt geometry. First, we present a traditional approach of the one-way waveguide of light using surface polaritons under a static magnetic field. Second, we explain a recent discovery of a topological approach using photonic crystals with the magneto-optical coupling. Third, we present a combination of the two approaches, toward a broadband one-way waveguide in the microwave range.

  8. File-Based One-Way BISON Coupling Through VERA: User's Manual

    Energy Technology Data Exchange (ETDEWEB)

    Stimpson, Shane G. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-02-28

    Activities to incorporate fuel performance capabilities into the Virtual Environment for Reactor Applications (VERA) are receiving increasing attention [1–6]. The multiphysics emphasis is expanding as the neutronics (MPACT) and thermal-hydraulics (CTF) packages are becoming more mature. Capturing the finer details of fuel phenomena (swelling, densification, relocation, gap closure, etc.) is the natural next step in the VERA development process since these phenomena are currently not directly taken into account. While several codes could be used to accomplish this, the BISON fuel performance code [8,9] being developed by the Idaho National Laboratory (INL) is the focus of ongoing work in the Consortium for Advanced Simulation of Light Water Reactors (CASL). Built on INL’s MOOSE framework [10], BISON uses the finite element method for geometric representation and a Jacobian-free Newton-Krylov (JFNK) scheme to solve systems of partial differential equations for various fuel characteristic relationships. There are several modes of operation in BISON, but, this work uses a 2D azimuthally symmetric (R-Z) smeared-pellet model. This manual is intended to cover (1) the procedure pertaining to the standalone BISON one-way coupling from VERA and (2) the procedure to generate BISON fuel temperature tables that VERA can use.

  9. Topologically protected one-way edge mode in networks of acoustic resonators with circulating air flow

    International Nuclear Information System (INIS)

    Ni, Xu; He, Cheng; Sun, Xiao-Chen; Liu, Xiao-ping; Lu, Ming-Hui; Chen, Yan-Feng; Feng, Liang

    2015-01-01

    Recent explorations of topology in physical systems have led to a new paradigm of condensed matters characterized by topologically protected states and phase transition, for example, topologically protected photonic crystals enabled by magneto-optical effects. However, in other wave systems such as acoustics, topological states cannot be simply reproduced due to the absence of similar magnetics-related sound–matter interactions in naturally available materials. Here, we propose an acoustic topological structure by creating an effective gauge magnetic field for sound using circularly flowing air in the designed acoustic ring resonators. The created gauge magnetic field breaks the time-reversal symmetry, and therefore topological properties can be designed to be nontrivial with non-zero Chern numbers and thus to enable a topological sonic crystal, in which the topologically protected acoustic edge-state transport is observed, featuring robust one-way propagation characteristics against a variety of topological defects and impurities. Our results open a new venue to non-magnetic topological structures and promise a unique approach to effective manipulation of acoustic interfacial transport at will. (paper)

  10. Spin- and valley-polarized one-way Klein tunneling in photonic topological insulators.

    Science.gov (United States)

    Ni, Xiang; Purtseladze, David; Smirnova, Daria A; Slobozhanyuk, Alexey; Alù, Andrea; Khanikaev, Alexander B

    2018-05-01

    Recent advances in condensed matter physics have shown that the spin degree of freedom of electrons can be efficiently exploited in the emergent field of spintronics, offering unique opportunities for efficient data transfer, computing, and storage ( 1 - 3 ). These concepts have been inspiring analogous approaches in photonics, where the manipulation of an artificially engineered pseudospin degree of freedom can be enabled by synthetic gauge fields acting on light ( 4 - 6 ). The ability to control these degrees of freedom significantly expands the landscape of available optical responses, which may revolutionize optical computing and the basic means of controlling light in photonic devices across the entire electromagnetic spectrum. We demonstrate a new class of photonic systems, described by effective Hamiltonians in which competing synthetic gauge fields, engineered in pseudospin, chirality/sublattice, and valley subspaces, result in bandgap opening at one of the valleys, whereas the other valley exhibits Dirac-like conical dispersion. We show that this effective response has marked implications on photon transport, among which are as follows: (i) a robust pseudospin- and valley-polarized one-way Klein tunneling and (ii) topological edge states that coexist within the Dirac continuum for opposite valley and pseudospin polarizations. These phenomena offer new ways to control light in photonics, in particular, for on-chip optical isolation, filtering, and wave-division multiplexing by selective action on their pseudospin and valley degrees of freedom.

  11. Spin- and valley-polarized one-way Klein tunneling in photonic topological insulators

    Science.gov (United States)

    Slobozhanyuk, Alexey

    2018-01-01

    Recent advances in condensed matter physics have shown that the spin degree of freedom of electrons can be efficiently exploited in the emergent field of spintronics, offering unique opportunities for efficient data transfer, computing, and storage (1–3). These concepts have been inspiring analogous approaches in photonics, where the manipulation of an artificially engineered pseudospin degree of freedom can be enabled by synthetic gauge fields acting on light (4–6). The ability to control these degrees of freedom significantly expands the landscape of available optical responses, which may revolutionize optical computing and the basic means of controlling light in photonic devices across the entire electromagnetic spectrum. We demonstrate a new class of photonic systems, described by effective Hamiltonians in which competing synthetic gauge fields, engineered in pseudospin, chirality/sublattice, and valley subspaces, result in bandgap opening at one of the valleys, whereas the other valley exhibits Dirac-like conical dispersion. We show that this effective response has marked implications on photon transport, among which are as follows: (i) a robust pseudospin- and valley-polarized one-way Klein tunneling and (ii) topological edge states that coexist within the Dirac continuum for opposite valley and pseudospin polarizations. These phenomena offer new ways to control light in photonics, in particular, for on-chip optical isolation, filtering, and wave-division multiplexing by selective action on their pseudospin and valley degrees of freedom. PMID:29756032

  12. One way to save the number of BPM buttons in the arcs that is not recommended

    International Nuclear Information System (INIS)

    Chao, A.; Kheifets, S.

    1983-12-01

    It has been suggested as a possibility by the beam dynamic task force that the SLC arcs be provided a beam position monitor at every gap between magnets. In this scenario of orbit correction scheme, the BPM's are used alternately for the horizontal and the vertical orbit measurements. One way to construct these BPM's is therefore in the x and y planes. One problem of this construction, as pointed out by Pellegrin and Rees, is that synchrotron radiation will hit the buttons of the x-BPM's. It was suggested then that the x-BPM's should use four buttons, orthogonal, but rotated 45 0 from the x and y planes. This construction requires 4 buttons instead of 2, meaning an increase of cost. As an attempt to reduce the number of buttons needed for arc orbit correction, we have studied a variation of the orbit correction scheme. In this scheme, orbits are not corrected in the x and y coordinates but in the coordinates that are tilted by 45 0 relative to x and y. Let these coordinates be called u and v. The result of the study is that this scheme is not recommended

  13. Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming

    Directory of Open Access Journals (Sweden)

    Lin Xiao

    2017-01-01

    Full Text Available An untrusted relay system combined with a simultaneous wireless information and power transfer (SWIPT scheme is considered in one-way and two-way relaying transmission strategies. In the system, two source nodes can only communicate with each other via an untrusted energy harvesting relay node, which sends the message by using its harvested energy from the source nodes. Specifically, we classify the intermediate relay as an eavesdropper into two modes: active eavesdropper and nonactive eavesdropper, depending on whether it has sufficient energy of its own to transmit the message or not. Under a simplified three-node fading wiretap channel setup, the transmit power allocation and power splitting ratio are jointly optimized to minimize the outage probability in the delay-sensitive case and to maximize the average rate in the delay-insensitive case, subject to the average and peak total power constraints. Applying the dual-decomposition method, the optimization problem can be efficiently solved in the delay-sensitive scenario. Moreover, an iterative algorithm is proposed to derive the solution to maximize the average rate in the delay-insensitive scenario. Numerical results demonstrate the performance of system outage probability in the two modes versus different rates and how efficiently the secrecy rate is improved compared with traditional schemes.

  14. Effect of non-normality on test statistics for one-way independent groups designs.

    Science.gov (United States)

    Cribbie, Robert A; Fiksenbaum, Lisa; Keselman, H J; Wilcox, Rand R

    2012-02-01

    The data obtained from one-way independent groups designs is typically non-normal in form and rarely equally variable across treatment populations (i.e., population variances are heterogeneous). Consequently, the classical test statistic that is used to assess statistical significance (i.e., the analysis of variance F test) typically provides invalid results (e.g., too many Type I errors, reduced power). For this reason, there has been considerable interest in finding a test statistic that is appropriate under conditions of non-normality and variance heterogeneity. Previously recommended procedures for analysing such data include the James test, the Welch test applied either to the usual least squares estimators of central tendency and variability, or the Welch test with robust estimators (i.e., trimmed means and Winsorized variances). A new statistic proposed by Krishnamoorthy, Lu, and Mathew, intended to deal with heterogeneous variances, though not non-normality, uses a parametric bootstrap procedure. In their investigation of the parametric bootstrap test, the authors examined its operating characteristics under limited conditions and did not compare it to the Welch test based on robust estimators. Thus, we investigated how the parametric bootstrap procedure and a modified parametric bootstrap procedure based on trimmed means perform relative to previously recommended procedures when data are non-normal and heterogeneous. The results indicated that the tests based on trimmed means offer the best Type I error control and power when variances are unequal and at least some of the distribution shapes are non-normal. © 2011 The British Psychological Society.

  15. One-way-coupling simulation of cavitation accompanied by high-speed droplet impact

    Energy Technology Data Exchange (ETDEWEB)

    Kondo, Tomoki; Ando, Keita, E-mail: kando@mech.keio.ac.jp [Department of Mechanical Engineering, Keio University, 3-14-1 Hiyoshi, Kohoku-ku, Yokohama 223-8522 (Japan)

    2016-03-15

    Erosion due to high-speed droplet impact is a crucial issue in industrial applications. The erosion is caused by the water-hammer loading on material surfaces and possibly by the reloading from collapsing cavitation bubbles that appear within the droplet. Here, we simulate the dynamics of cavitation bubbles accompanied by high-speed droplet impact against a deformable wall in order to see whether the bubble collapse is violent enough to give rise to cavitation erosion on the wall. The evolution of pressure waves in a single water (or gelatin) droplet to collide with a deformable wall at speed up to 110 m/s is inferred from simulations of multicomponent Euler flow where phase changes are not permitted. Then, we examine the dynamics of cavitation bubbles nucleated from micron/submicron-sized gas bubble nuclei that are supposed to exist inside the droplet. For simplicity, we perform Rayleigh–Plesset-type calculations in a one-way-coupling manner, namely, the bubble dynamics are determined according to the pressure variation obtained from the Euler flow simulation. In the simulation, the preexisting bubble nuclei whose size is either micron or submicron show large growth to submillimeters because tension inside the droplet is obtained through interaction of the pressure waves and the droplet interface; this supports the possibility of having cavitation due to the droplet impact. It is also found, in particular, for the case of cavitation arising from very small nuclei such as nanobubbles, that radiated pressure from the cavitation bubble collapse can overwhelm the water-hammer pressure directly created by the impact. Hence, cavitation may need to be accounted for when it comes to discussing erosion in the droplet impact problem.

  16. Single blastocyst transfer: The key to reduce multiple pregnancy rates without compromising the live birth rate

    Directory of Open Access Journals (Sweden)

    Uma M Sundhararaj

    2017-01-01

    Full Text Available Background: Historically, to achieve higher pregnancy rates, multiple embryos were transferred after an in-vitro fertilisation (IVF. However, this practice is being reassessed, because it leads to multiple pregnancies that is known to cause adverse maternal and fetal outcomes. Aim: To compare the pregnancy outcomes in fresh IVF or intracytoplasmic sperm injection (ICSI cycles among women undergoing elective single blastocyst transfer (eSBT vs. those undergoing double blastocyst transfer (DBT. Settings and Design: It is a retrospective data analysis of 582 patients undergoing fresh IVF/ICSI cycles performed from January 2012 to June 2015. Materials and Methods: Patients, who underwent IVF/ICSI and developed more than one blastocyst, were included in the study. Donor cycles were excluded from the study. All the embryos were cultured to blastocyst stage in sequential media followed by transfer of two blastocysts (DBT or eSBT and cryopreservation of the remaining. Statistical Analysis: Statistical analysis was performed using chi square test. Results: Out of 582 patients, in 149 patients one blastocyst was transferred and in 433 patients two blastocysts were transferred. There was no statistical difference in the biochemical pregnancy rate, clinical pregnancy rate and live birth rate in both the groups. Statistics demonstrated a significant drop in miscarriage rate in eSBT group. There was no incidence of twins in eSBT group, whereas twin birth rate per clinical pregnancy was 29.02% in DBT group. Conclusion: Single blastocyst transfer is an effective method to reduce the risk of multiple births without compromising the pregnancy outcomes. Given the promising potential of vitrification; the remaining blastocyst can be cryopreserved.

  17. Fish ladder of Lajeado Dam: migrations on one-way routes?

    Directory of Open Access Journals (Sweden)

    Angelo Antônio Agostinho

    half of the reservoir; those found in water flowing through the spillways, turbines or fish ladder of Lajeado Dam belonged essentially to non-migratory clupeids that spawn in the inner part of the reservoir. In addition, results showed that in a reservoir with no fish-passage mechanism, migrants select habitats that still maintain riverine characteristics, in the upper parts of the impounded area. The downward movements are negligible compared to those upward, in the experiments conducted in the fish ladder. It is concluded, therefore, that the Lajeado fish ladder, and possibly those at other dams, is essentially a one-way route that promotes upstream movements of migrants, without the necessary return of adults or their offspring. Thus, the low permeability of the connections provided by these management tools can drastically increase the level of environmental impact that they were actually intended to reduce.

  18. Overcoming the rate-distance limit of quantum key distribution without quantum repeaters.

    Science.gov (United States)

    Lucamarini, M; Yuan, Z L; Dynes, J F; Shields, A J

    2018-05-01

    Quantum key distribution (QKD) 1,2 allows two distant parties to share encryption keys with security based on physical laws. Experimentally, QKD has been implemented via optical means, achieving key rates of 1.26 megabits per second over 50 kilometres of standard optical fibre 3 and of 1.16 bits per hour over 404 kilometres of ultralow-loss fibre in a measurement-device-independent configuration 4 . Increasing the bit rate and range of QKD is a formidable, but important, challenge. A related target, which is currently considered to be unfeasible without quantum repeaters 5-7 , is overcoming the fundamental rate-distance limit of QKD 8 . This limit defines the maximum possible secret key rate that two parties can distil at a given distance using QKD and is quantified by the secret-key capacity of the quantum channel 9 that connects the parties. Here we introduce an alternative scheme for QKD whereby pairs of phase-randomized optical fields are first generated at two distant locations and then combined at a central measuring station. Fields imparted with the same random phase are 'twins' and can be used to distil a quantum key. The key rate of this twin-field QKD exhibits the same dependence on distance as does a quantum repeater, scaling with the square-root of the channel transmittance, irrespective of who (malicious or otherwise) is in control of the measuring station. However, unlike schemes that involve quantum repeaters, ours is feasible with current technology and presents manageable levels of noise even on 550 kilometres of standard optical fibre. This scheme is a promising step towards overcoming the rate-distance limit of QKD and greatly extending the range of secure quantum communications.

  19. Non-reciprocity and topology in optics: one-way road for light via surface magnon polariton

    Science.gov (United States)

    Ochiai, Tetsuyuki

    2015-01-01

    We show how non-reciprocity and topology are used to construct an optical one-way waveguide in the Voigt geometry. First, we present a traditional approach of the one-way waveguide of light using surface polaritons under a static magnetic field. Second, we explain a recent discovery of a topological approach using photonic crystals with the magneto-optical coupling. Third, we present a combination of the two approaches, toward a broadband one-way waveguide in the microwave range. PMID:27877739

  20. Preservation of a lower bound of quantum secret key rate in the presence of decoherence

    Energy Technology Data Exchange (ETDEWEB)

    Datta, Shounak, E-mail: shounak.datta@bose.res.in; Goswami, Suchetana, E-mail: suchetana.goswami@bose.res.in; Pramanik, Tanumoy, E-mail: tanu.pram99@bose.res.in; Majumdar, A.S., E-mail: archan@bose.res.in

    2017-03-11

    It is well known that the interaction of quantum systems with the environment reduces the inherent quantum correlations. Under special circumstances the effect of decoherence can be reversed, for example, the interaction modelled by an amplitude damping channel can boost the teleportation fidelity from the classical to the quantum region for a bipartite quantum state. Here, we first show that this phenomenon fails to preserve the quantum secret key rate derived under individual attack. We further show that the technique of weak measurement can be used to slow down the process of decoherence, thereby helping to preserve the quantum secret key rate when one or both systems are interacting with the environment via an amplitude damping channel. Most interestingly, in certain cases weak measurement with post-selection where one considers both success and failure of the technique is shown to be more useful than without it when both systems interact with the environment. - Highlights: • In general, decoherence has negative effect on the steerability and quantum secret key rate of a bipartite state. • Quantum key rate can be preserved against the effect of decoherence using the technique of weak measurement. • The technique of weak measurements includes a weak measurement and its reversal. • For some strength of weak measurement and environmental interaction, the average secret key rate is improved.

  1. Preservation of a lower bound of quantum secret key rate in the presence of decoherence

    International Nuclear Information System (INIS)

    Datta, Shounak; Goswami, Suchetana; Pramanik, Tanumoy; Majumdar, A.S.

    2017-01-01

    It is well known that the interaction of quantum systems with the environment reduces the inherent quantum correlations. Under special circumstances the effect of decoherence can be reversed, for example, the interaction modelled by an amplitude damping channel can boost the teleportation fidelity from the classical to the quantum region for a bipartite quantum state. Here, we first show that this phenomenon fails to preserve the quantum secret key rate derived under individual attack. We further show that the technique of weak measurement can be used to slow down the process of decoherence, thereby helping to preserve the quantum secret key rate when one or both systems are interacting with the environment via an amplitude damping channel. Most interestingly, in certain cases weak measurement with post-selection where one considers both success and failure of the technique is shown to be more useful than without it when both systems interact with the environment. - Highlights: • In general, decoherence has negative effect on the steerability and quantum secret key rate of a bipartite state. • Quantum key rate can be preserved against the effect of decoherence using the technique of weak measurement. • The technique of weak measurements includes a weak measurement and its reversal. • For some strength of weak measurement and environmental interaction, the average secret key rate is improved.

  2. Can the one-way speed of light be used for detection of violations of the relativity principle?

    International Nuclear Information System (INIS)

    Spavieri, Gianfranco; Quintero, Jesús; Unnikrishnan, C.S.; Gillies, George T.; Cavalleri, Giancarlo; Tonni, Ernesto; Bosi, Leonardo

    2012-01-01

    Experimental attempts at measurement of the one-way speed of light are considered within the framework of relativistic theories. We show that if the effect of clock transport is taken into account, the observations from this class of experiment do not actually lead to either measurement of the one-way speed of light or determination of the absolute velocity of the preferred frame (even if, for non-entrained ether theories, such a frame were to exist). -- Highlights: ► We consider preferred frame theories that agree with experiments that support SR. ► Measurements of the one-way speed of light is discussed. ► The effect of clock transport is taken into account. ► These experiments do not lead to measurement of the one-way speed of light. ► The absolute velocity of the preferred frame cannot be detected.

  3. Deterministic one-way simulation of two-way, real-time cellular automata and its related problems

    Energy Technology Data Exchange (ETDEWEB)

    Umeo, H; Morita, K; Sugata, K

    1982-06-13

    The authors show that for any deterministic two-way, real-time cellular automaton, m, there exists a deterministic one-way cellular automation which can simulate m in twice real-time. Moreover the authors present a new type of deterministic one-way cellular automata, called circular cellular automata, which are computationally equivalent to deterministic two-way cellular automata. 7 references.

  4. Performance Comparison of Reservation Based and Instant Access One-Way Car Sharing Service through Discrete Event Simulation

    Directory of Open Access Journals (Sweden)

    Ganjar Alfian

    2015-09-01

    Full Text Available A car sharing service has been highlighted as a new urban transport alternative for an environmentally friendly economy. As the demand for the service from customers increases, car sharing operators need to introduce a new service such as a one-way option that will allow customers to return the car to different stations. Due to the complexity of the one-way system, it needs to be managed and optimized for real cases. This paper focuses on developing a simulation model in order to help operators evaluate the performance of the one-way service. In addition, this research demonstrates a strategy for an open one-way service that can increase revenue and customer satisfaction. A real case dataset is used for investigation to find the best result from the simulation. The result showed that the total number of cars, number of one-way reservations and station size have an impact on one-way performance. Thus, company profit and customer satisfaction can be maximized by optimizing these factors.

  5. A novel method for one-way hash function construction based on spatiotemporal chaos

    International Nuclear Information System (INIS)

    Ren Haijun; Wang Yong; Xie Qing; Yang Huaqian

    2009-01-01

    A novel hash algorithm based on a spatiotemporal chaos is proposed. The original message is first padded with zeros if needed. Then it is divided into a number of blocks each contains 32 bytes. In the hashing process, each block is partitioned into eight 32-bit values and input into the spatiotemporal chaotic system. Then, after iterating the system for four times, the next block is processed by the same way. To enhance the confusion and diffusion effect, the cipher block chaining (CBC) mode is adopted in the algorithm. The hash value is obtained from the final state value of the spatiotemporal chaotic system. Theoretic analyses and numerical simulations both show that the proposed hash algorithm possesses good statistical properties, strong collision resistance and high efficiency, as required by practical keyed hash functions.

  6. A novel method for one-way hash function construction based on spatiotemporal chaos

    Energy Technology Data Exchange (ETDEWEB)

    Ren Haijun [College of Software Engineering, Chongqing University, Chongqing 400044 (China); State Key Laboratory of Power Transmission Equipment and System Security and New Technology, Chongqing University, Chongqing 400044 (China)], E-mail: jhren@cqu.edu.cn; Wang Yong; Xie Qing [Key Laboratory of Electronic Commerce and Logistics of Chongqing, Chongqing University of Posts and Telecommunications, Chongqing 400065 (China); Yang Huaqian [Department of Computer and Modern Education Technology, Chongqing Education of College, Chongqing 400067 (China)

    2009-11-30

    A novel hash algorithm based on a spatiotemporal chaos is proposed. The original message is first padded with zeros if needed. Then it is divided into a number of blocks each contains 32 bytes. In the hashing process, each block is partitioned into eight 32-bit values and input into the spatiotemporal chaotic system. Then, after iterating the system for four times, the next block is processed by the same way. To enhance the confusion and diffusion effect, the cipher block chaining (CBC) mode is adopted in the algorithm. The hash value is obtained from the final state value of the spatiotemporal chaotic system. Theoretic analyses and numerical simulations both show that the proposed hash algorithm possesses good statistical properties, strong collision resistance and high efficiency, as required by practical keyed hash functions.

  7. One-way hash function construction based on chaotic map network

    International Nuclear Information System (INIS)

    Yang Huaqian; Wong, K.-W.; Liao Xiaofeng; Wang Yong; Yang Degang

    2009-01-01

    A novel chaotic hash algorithm based on a network structure formed by 16 chaotic maps is proposed. The original message is first padded with zeros to make the length a multiple of four. Then it is divided into a number of blocks each contains 4 bytes. In the hashing process, the blocks are mixed together by the chaotic map network since the initial value and the control parameter of each tent map are dynamically determined by the output of its neighbors. To enhance the confusion and diffusion effect, the cipher block chaining (CBC) mode is adopted in the algorithm. Theoretic analyses and numerical simulations both show that the proposed hash algorithm possesses good statistical properties, strong collision resistance and high flexibility, as required by practical keyed hash functions.

  8. Device-independent secret-key-rate analysis for quantum repeaters

    Science.gov (United States)

    Holz, Timo; Kampermann, Hermann; Bruß, Dagmar

    2018-01-01

    The device-independent approach to quantum key distribution (QKD) aims to establish a secret key between two or more parties with untrusted devices, potentially under full control of a quantum adversary. The performance of a QKD protocol can be quantified by the secret key rate, which can be lower bounded via the violation of an appropriate Bell inequality in a setup with untrusted devices. We study secret key rates in the device-independent scenario for different quantum repeater setups and compare them to their device-dependent analogon. The quantum repeater setups under consideration are the original protocol by Briegel et al. [Phys. Rev. Lett. 81, 5932 (1998), 10.1103/PhysRevLett.81.5932] and the hybrid quantum repeater protocol by van Loock et al. [Phys. Rev. Lett. 96, 240501 (2006), 10.1103/PhysRevLett.96.240501]. For a given repeater scheme and a given QKD protocol, the secret key rate depends on a variety of parameters, such as the gate quality or the detector efficiency. We systematically analyze the impact of these parameters and suggest optimized strategies.

  9. Preserving the Helmholtz dispersion relation: One-way acoustic wave propagation using matrix square roots

    Science.gov (United States)

    Keefe, Laurence

    2016-11-01

    Parabolized acoustic propagation in transversely inhomogeneous media is described by the operator update equation U (x , y , z + Δz) =eik0 (- 1 +√{ 1 + Z }) U (x , y , z) for evolution of the envelope of a wavetrain solution to the original Helmholtz equation. Here the operator, Z =∇T2 + (n2 - 1) , involves the transverse Laplacian and the refractive index distribution. Standard expansion techniques (on the assumption Z << 1)) produce pdes that approximate, to greater or lesser extent, the full dispersion relation of the original Helmholtz equation, except that none of them describe evanescent/damped waves without special modifications to the expansion coefficients. Alternatively, a discretization of both the envelope and the operator converts the operator update equation into a matrix multiply, and existing theorems on matrix functions demonstrate that the complete (discrete) Helmholtz dispersion relation, including evanescent/damped waves, is preserved by this discretization. Propagation-constant/damping-rates contour comparisons for the operator equation and various approximations demonstrate this point, and how poorly the lowest-order, textbook, parabolized equation describes propagation in lined ducts.

  10. Participation rate or informed choice? Rethinking the European key performance indicators for mammography screening.

    Science.gov (United States)

    Strech, Daniel

    2014-03-01

    Despite the intensive controversies about the likelihood of benefits and harms of mammography screening almost all experts conclude that the choice to screen or not to screen needs to be made by the individual patient who is adequately informed. However, the "European guideline for quality assurance in breast cancer screening and diagnosis" specifies a participation rate of 70% as the key performance indicator for mammography screening. This paper argues that neither the existing evidence on benefits and harms, nor survey research with women, nor compliance rates in clinical trials, nor cost-effectiveness ratios justify participation rates as a reasonable performance indicator for preference-sensitive condition such as mammography screening. In contrast, an informed choice rate would be more reasonable. Further research needs to address the practical challenges in assessing informed choice rates. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  11. Rate effects on timing, key velocity, and finger kinematics in piano performance.

    Science.gov (United States)

    Bella, Simone Dalla; Palmer, Caroline

    2011-01-01

    We examined the effect of rate on finger kinematics in goal-directed actions of pianists. In addition, we evaluated whether movement kinematics can be treated as an indicator of personal identity. Pianists' finger movements were recorded with a motion capture system while they performed melodies from memory at different rates. Pianists' peak finger heights above the keys preceding keystrokes increased as tempo increased, and were attained about one tone before keypress. These rate effects were not simply due to a strategy to increase key velocity (associated with tone intensity) of the corresponding keystroke. Greater finger heights may compensate via greater tactile feedback for a speed-accuracy tradeoff that underlies the tendency toward larger temporal variability at faster tempi. This would allow pianists to maintain high temporal accuracy when playing at fast rates. In addition, finger velocity and accelerations as pianists' fingers approached keys were sufficiently unique to allow pianists' identification with a neural-network classifier. Classification success was higher in pianists with more extensive musical training. Pianists' movement "signatures" may reflect unique goal-directed movement kinematic patterns, leading to individualistic sound.

  12. Rate effects on timing, key velocity, and finger kinematics in piano performance.

    Directory of Open Access Journals (Sweden)

    Simone Dalla Bella

    Full Text Available We examined the effect of rate on finger kinematics in goal-directed actions of pianists. In addition, we evaluated whether movement kinematics can be treated as an indicator of personal identity. Pianists' finger movements were recorded with a motion capture system while they performed melodies from memory at different rates. Pianists' peak finger heights above the keys preceding keystrokes increased as tempo increased, and were attained about one tone before keypress. These rate effects were not simply due to a strategy to increase key velocity (associated with tone intensity of the corresponding keystroke. Greater finger heights may compensate via greater tactile feedback for a speed-accuracy tradeoff that underlies the tendency toward larger temporal variability at faster tempi. This would allow pianists to maintain high temporal accuracy when playing at fast rates. In addition, finger velocity and accelerations as pianists' fingers approached keys were sufficiently unique to allow pianists' identification with a neural-network classifier. Classification success was higher in pianists with more extensive musical training. Pianists' movement "signatures" may reflect unique goal-directed movement kinematic patterns, leading to individualistic sound.

  13. Quantum-locked key distribution at nearly the classical capacity rate.

    Science.gov (United States)

    Lupo, Cosmo; Lloyd, Seth

    2014-10-17

    Quantum data locking is a protocol that allows for a small secret key to (un)lock an exponentially larger amount of information, hence yielding the strongest violation of the classical one-time pad encryption in the quantum setting. This violation mirrors a large gap existing between two security criteria for quantum cryptography quantified by two entropic quantities: the Holevo information and the accessible information. We show that the latter becomes a sensible security criterion if an upper bound on the coherence time of the eavesdropper's quantum memory is known. Under this condition, we introduce a protocol for secret key generation through a memoryless qudit channel. For channels with enough symmetry, such as the d-dimensional erasure and depolarizing channels, this protocol allows secret key generation at an asymptotic rate as high as the classical capacity minus one bit.

  14. Heteroscedastic Tests Statistics for One-Way Analysis of Variance: The Trimmed Means and Hall's Transformation Conjunction

    Science.gov (United States)

    Luh, Wei-Ming; Guo, Jiin-Huarng

    2005-01-01

    To deal with nonnormal and heterogeneous data for the one-way fixed effect analysis of variance model, the authors adopted a trimmed means method in conjunction with Hall's invertible transformation into a heteroscedastic test statistic (Alexander-Govern test or Welch test). The results of simulation experiments showed that the proposed technique…

  15. Neutrino energy loss rates due to key iron isotopes for core-collapse physics

    International Nuclear Information System (INIS)

    Nabi, J.-U.

    2008-07-01

    Accurate estimates of neutrino energy loss rates are needed for the study of the late stages of the stellar evolution, in particular for the cooling of neutron stars and white dwarfs. The energy spectra of neutrinos and antineutrinos arriving at the Earth can also provide useful information on the primary neutrino fluxes as well as neutrino mixing scenario. Proton-neutron quasi-particle random phase approximation (pn-QRPA) theory has recently being used for a microscopic calculation of stellar weak interaction rates of fp-shell nuclide, particularly iron isotopes, with success. Here I present the calculation of neutrino and antineutrino energy loss rates due to key iron isotopes in stellar matter using the pn-QRPA theory. The rates are calculated on a fine grid of temperature-density scale suitable for core-collapse simulators. The calculated rates are compared against earlier calculations. The neutrino cooling rates due to even-even isotopes of iron, 54,56 Fe, are in good agreement with the rates calculated using the large-scale shell model. The pn-QRPA calculated neutrino energy loss rates due to 55 Fe are enhanced roughly around an order of magnitude compared to the large-scale shell model calculation during the oxygen and silicon shell burning stages of massive stars and favor a lower entropy for the cores of massive stars. (author)

  16. One-way quantum computation via manipulation of polarization and momentum qubits in two-photon cluster states

    International Nuclear Information System (INIS)

    Vallone, G; Pomarico, E; De Martini, F; Mataloni, P

    2008-01-01

    Four-qubit cluster states of two photons entangled in polarization and linear momentum have been used to realize a complete set of single qubit rotations and the C-NOT gate for equatorial qubits with high values of fidelity. By the computational equivalence of the two degrees of freedom our result demonstrate the suitability of two photon cluster states for rapid and efficient one-way quantum computing

  17. Deprivation index and dependency ratio are key determinants of emergency medical admission rates.

    Science.gov (United States)

    Conway, Richard; Byrne, Declan; O'Riordan, Deirdre; Cournane, Seán; Coveney, Seamus; Silke, Bernard

    2015-11-01

    Patients from deprived backgrounds have a higher in-patient mortality following an emergency medical admission; there has been debate as to the extent to which deprivation and population structure influences hospital admission rate. All emergency medical admissions to an Irish hospital over a 12-year period (2002-2013) categorized by quintile of Deprivation Index and Dependency Ratio (proportion of population Dependency Ratio was an independent predictor of the admission rate with adjusted predicted rates of Q1 20.8 (95%CI 20.5 to 21.1), Q2 19.2 (95%CI 19.0 to 19.4), Q3 27.6 (95%CI 27.3 to 27.9), Q4 43.9 (95%CI 43.5 to 44.4) and Q5 34.4 (95%CI 34.1 to 34.7). A high concurrent Deprivation Index and Dependency Ratio were associated with very high admission rates. Deprivation Index and population Dependency Ratio are key determinants of the rate of emergency medical admissions. Copyright © 2015 European Federation of Internal Medicine. Published by Elsevier B.V. All rights reserved.

  18. On the problem of non-zero word error rates for fixed-rate error correction codes in continuous variable quantum key distribution

    International Nuclear Information System (INIS)

    Johnson, Sarah J; Ong, Lawrence; Shirvanimoghaddam, Mahyar; Lance, Andrew M; Symul, Thomas; Ralph, T C

    2017-01-01

    The maximum operational range of continuous variable quantum key distribution protocols has shown to be improved by employing high-efficiency forward error correction codes. Typically, the secret key rate model for such protocols is modified to account for the non-zero word error rate of such codes. In this paper, we demonstrate that this model is incorrect: firstly, we show by example that fixed-rate error correction codes, as currently defined, can exhibit efficiencies greater than unity. Secondly, we show that using this secret key model combined with greater than unity efficiency codes, implies that it is possible to achieve a positive secret key over an entanglement breaking channel—an impossible scenario. We then consider the secret key model from a post-selection perspective, and examine the implications for key rate if we constrain the forward error correction codes to operate at low word error rates. (paper)

  19. Key factors influencing rates of heterotrophic sulfate reduction in active seafloor hydrothermal massive sulfide deposits

    Directory of Open Access Journals (Sweden)

    Kiana Laieikawai Frank

    2015-12-01

    Full Text Available Hydrothermal vents are thermally and geochemically dynamic habitats, and the organisms therein are subject to steep gradients in temperature and chemistry. To date, the influence of these environmental dynamics on microbial sulfate reduction has not been well constrained. Here, via multivariate experiments, we evaluate the effects of key environmental variables (temperature, pH, H2S, SO42-, DOC on sulfate reduction rates and metabolic energy yields in material recovered from a hydrothermal flange from the Grotto edifice in the Main Endeavor Field, Juan de Fuca Ridge. Sulfate reduction was measured in batch reactions across a range of physico-chemical conditions. Temperature and pH were the strongest stimuli, and maximum sulfate reduction rates were observed at 50 °C and pH 6, suggesting that the in situ community of sulfate-reducing organisms in Grotto flanges may be most active in a slightly acidic and moderate thermal/chemical regime. At pH 4, sulfate reduction rates increased with sulfide concentrations most likely due to the mitigation of metal toxicity. While substrate concentrations also influenced sulfate reduction rates, energy-rich conditions muted the effect of metabolic energetics on sulfate reduction rates. We posit that variability in sulfate reduction rates reflect the response of the active microbial consortia to environmental constraints on in situ microbial physiology, toxicity, and the type and extent of energy limitation. These experiments help to constrain models of the spatial contribution of heterotrophic sulfate reduction within the complex gradients inherent to seafloor hydrothermal deposits.

  20. Structural Behavior of Fibrous Reinforced Concrete Hollow Core One-Way Slabs Strengthening by C.F.R.P

    Directory of Open Access Journals (Sweden)

    وصيف مجيد

    2016-02-01

    Full Text Available A reinforced concrete hollow core one-way slab is one of the types of slabs used widely around the world in residential and industrial buildings to take advantage of them Economic and thermal insulation as well as to reduce the self-weight of the construction. The aim of the present study is to examine the structural behavior of the reinforced concrete hollow core one-way slabs reduce failure using the normal concrete and fibrous concrete and then strengthened using carbon fiber(CFRPThis study include molding of ( 6 specimens differ in terms of the voids volume (Vv , volumetric percentage of steel fibers (ا, and then strengthened by using fibers of carbon , with the aim of rehabilitation by fibers, carbon polymer (CFRP is to find out how efficient element structural when treated after the occurrence of the failure and the validity of its use in the event of a failure has occurred entirely or partly in the roof, and re- examined using the same method and conditions that were examined ceilings is affected through it, knowing that these ceilings have been addressed and strengthened in the same way , the results of the tests of the models that have been rehabilitated using carbon fiber (CFRP, compared with the same models before strengthening and examined reduce failure, increased very high susceptibility endurance extreme , with the increase ranging from (51.6% to (96.2%, as has been observed decrease in deflection value of models after strengthening by (CFRP.It is concluded through this study the possibility of using its concrete hollow core one-way slab as a roofing system for buildings also proved the highly efficient for this slab after rehabilitation using carbon fiber (CFRP.

  1. structural behavior of fibrous reinforced concrete hollowcore one-way slabs strengthening by C.F.R.P

    Directory of Open Access Journals (Sweden)

    wassif khudair majeed

    2016-02-01

    Full Text Available Abstract A reinforced concrete hollow core one-way slab is one of the types of slabs used widely around the world in residential and industrial buildings to take advantage of them Economic and thermal insulation as well as to reduce the self weight of the construction . The aim of the present study is to examine the structural behavior of the reinforced concrete hollow core one-way slabs  reduce failure using the normal concrete and fibrous concrete and then strengthened using carbon fiber(CFRP This study include molding of ( 6 specimens differ in terms of the voids volume (Vv , volumetric percentage of steel fibers ( , and then strengthened by using fibers of carbon , with the aim of rehabilitation by fibers, carbon polymer (CFRP is to find out how efficient element structural when treated after the occurrence of the failure and the validity of its use in the event of a failure has occurred entirely or partly in the roof, and re- examined using the same method and conditions that were examined ceilings is affected through it, knowing that these ceilings have been addressed and strengthened in the same way , the results of the tests of the models that have been rehabilitated using carbon fiber (CFRP, compared with the same models before strengthening and examined reduce failure, increased very high susceptibility endurance extreme , with the increase ranging from (51.6% to ( 96.2% , as has been observed decrease in deflection value of models after strengthening by (CFRP. It is concluded through this study the possibility of using its concrete hollow core one-way slab as a roofing system for buildings also proved the highly efficient for this slab after rehabilitation using carbon fiber (CFRP .

  2. 60-GHz integrated-circuit high data rate quadriphase shift keying exciter and modulator

    Science.gov (United States)

    Grote, A.; Chang, K.

    1984-01-01

    An integrated-circuit quadriphase shift keying (QPSK) exciter and modulator have demonstrated excellent performance directly modulating a carrier frequency of 60 GHz with an output phase error of less than 3 degrees and maximum amplitude error of 0.5 dB. The circuit consists of a 60-GHz Gunn VCO phase-locked to a low-frequency reference source, a 4th subharmonic mixer, and a QPSK modlator packaged into a small volume of 1.8 x 2.5 x 0.35 in. The use of microstrip has the advantages of small size, light-weight, and low-cost fabrication. The unit has the potential for multigigabit data rate applications.

  3. On the sub-model errors of a generalized one-way coupling scheme for linking models at different scales

    Science.gov (United States)

    Zeng, Jicai; Zha, Yuanyuan; Zhang, Yonggen; Shi, Liangsheng; Zhu, Yan; Yang, Jinzhong

    2017-11-01

    Multi-scale modeling of the localized groundwater flow problems in a large-scale aquifer has been extensively investigated under the context of cost-benefit controversy. An alternative is to couple the parent and child models with different spatial and temporal scales, which may result in non-trivial sub-model errors in the local areas of interest. Basically, such errors in the child models originate from the deficiency in the coupling methods, as well as from the inadequacy in the spatial and temporal discretizations of the parent and child models. In this study, we investigate the sub-model errors within a generalized one-way coupling scheme given its numerical stability and efficiency, which enables more flexibility in choosing sub-models. To couple the models at different scales, the head solution at parent scale is delivered downward onto the child boundary nodes by means of the spatial and temporal head interpolation approaches. The efficiency of the coupling model is improved either by refining the grid or time step size in the parent and child models, or by carefully locating the sub-model boundary nodes. The temporal truncation errors in the sub-models can be significantly reduced by the adaptive local time-stepping scheme. The generalized one-way coupling scheme is promising to handle the multi-scale groundwater flow problems with complex stresses and heterogeneity.

  4. Self-biased broadband magnet-free linear isolator based on one-way space-time coherency

    Science.gov (United States)

    Taravati, Sajjad

    2017-12-01

    This paper introduces a self-biased broadband magnet-free and linear isolator based on one-way space-time coherency. The incident wave and the space-time-modulated medium share the same temporal frequency and are hence temporally coherent. However, thanks to the unidirectionally of the space-time modulation, the space-time-modulated medium and the incident wave are spatially coherent only in the forward direction and not in the opposite direction. As a consequence, the energy of the medium strongly couples to the propagating wave in the forward direction, while it conflicts with the propagating wave in the opposite direction, yielding strong isolation. We first derive a closed-form solution for the wave scattering from a spatiotemporally coherent medium and then show that a perfectly coherent space-time-modulated medium provides a moderate isolation level which is also subject to one-way transmission gain. To overcome this issue, we next investigate the effect of space-coherency imperfection between the medium and the wave, while they are still perfectly temporally coherent. Leveraging the spatial-coherency imperfection, the medium exhibits a quasiarbitrary and strong nonreciprocal transmission. Finally, we present the experimental demonstration of the self-biased version of the proposed broadband isolator, exhibiting more than 122 % fractional operation bandwidth.

  5. Qualified nurses' rate new nursing graduates as lacking skills in key clinical areas.

    Science.gov (United States)

    Missen, Karen; McKenna, Lisa; Beauchamp, Alison; Larkins, Jo-Ann

    2016-08-01

    The aim of this study was to explore perceptions of qualified nurses on the abilities of newly registered nursing graduates to perform a variety of clinical skills. Evidence from the literature suggests that undergraduate nursing programmes do not adequately prepare nursing students to be practice-ready on completion of their nursing courses. A descriptive quantitative design was used. Participants were recruited through the Australian Nursing and Midwifery Federation, Victorian branch. A brief explanation of the study and a link to the survey were promoted in their monthly e-newsletter. A total of 245 qualified nurses in the state of Victoria, Australia participated in this study. A survey tool of 51 clinical skills and open-ended questions was used, whereby participants were asked to rate new nursing graduates' abilities using a 5-point Likert scale. Overall participants rated new nursing graduates' abilities for undertaking clinical skills as good or very good in 35·3% of skills, 33·3% were rated as adequate and 31·4% rated as being performed poorly or very poorly. Of concern, essential clinical skills, such as critical thinking and problem solving, working independently and assessment procedures, were found to be poorly executed and affecting new registered nurses graduates' competence. The findings from this study can further serve as a reference for nursing education providers to enhance nursing curricula and work collaboratively with healthcare settings in preparing nurses to be competent, safe practitioners on completion of their studies. Identifying key areas in which new nursing graduates are not yet competent means that educational providers and educators from healthcare settings can focus on these skills in better preparing our nurses to be work ready. © 2016 John Wiley & Sons Ltd.

  6. Nonlinear detection for a high rate extended binary phase shift keying system.

    Science.gov (United States)

    Chen, Xian-Qing; Wu, Le-Nan

    2013-03-28

    The algorithm and the results of a nonlinear detector using a machine learning technique called support vector machine (SVM) on an efficient modulation system with high data rate and low energy consumption is presented in this paper. Simulation results showed that the performance achieved by the SVM detector is comparable to that of a conventional threshold decision (TD) detector. The two detectors detect the received signals together with the special impacting filter (SIF) that can improve the energy utilization efficiency. However, unlike the TD detector, the SVM detector concentrates not only on reducing the BER of the detector, but also on providing accurate posterior probability estimates (PPEs), which can be used as soft-inputs of the LDPC decoder. The complexity of this detector is considered in this paper by using four features and simplifying the decision function. In addition, a bandwidth efficient transmission is analyzed with both SVM and TD detector. The SVM detector is more robust to sampling rate than TD detector. We find that the SVM is suitable for extended binary phase shift keying (EBPSK) signal detection and can provide accurate posterior probability for LDPC decoding.

  7. Nonlinear Detection for a High Rate Extended Binary Phase Shift Keying System

    Directory of Open Access Journals (Sweden)

    Le-Nan Wu

    2013-03-01

    Full Text Available The algorithm and the results of a nonlinear detector using a machine learning technique called support vector machine (SVM on an efficient modulation system with high data rate and low energy consumption is presented in this paper. Simulation results showed that the performance achieved by the SVM detector is comparable to that of a conventional threshold decision (TD detector. The two detectors detect the received signals together with the special impacting filter (SIF that can improve the energy utilization efficiency. However, unlike the TD detector, the SVM detector concentrates not only on reducing the BER of the detector, but also on providing accurate posterior probability estimates (PPEs, which can be used as soft-inputs of the LDPC decoder. The complexity of this detector is considered in this paper by using four features and simplifying the decision function. In addition, a bandwidth efficient transmission is analyzed with both SVM and TD detector. The SVM detector is more robust to sampling rate than TD detector. We find that the SVM is suitable for extended binary phase shift keying (EBPSK signal detection and can provide accurate posterior probability for LDPC decoding.

  8. Experimental quantum key distribution at 1.3 gigabit-per-second secret-key rate over a 10 dB loss channel

    Science.gov (United States)

    Zhang, Zheshen; Chen, Changchen; Zhuang, Quntao; Wong, Franco N. C.; Shapiro, Jeffrey H.

    2018-04-01

    Quantum key distribution (QKD) enables unconditionally secure communication ensured by the laws of physics, opening a promising route to security infrastructure for the coming age of quantum computers. QKD’s demonstrated secret-key rates (SKRs), however, fall far short of the gigabit-per-second rates of classical communication, hindering QKD’s widespread deployment. QKD’s low SKRs are largely due to existing single-photon-based protocols’ vulnerability to channel loss. Floodlight QKD (FL-QKD) boosts SKR by transmitting many photons per encoding, while offering security against collective attacks. Here, we report an FL-QKD experiment operating at a 1.3 Gbit s‑1 SKR over a 10 dB loss channel. To the best of our knowledge, this is the first QKD demonstration that achieves a gigabit-per-second-class SKR, representing a critical advance toward high-rate QKD at metropolitan-area distances.

  9. Collimated-hole structures as efficient differential pumping barrier, one-way valve and tool for aligning Penning traps

    International Nuclear Information System (INIS)

    Kluge, H.-Jürgen; Block, Michael; Herfurth, Frank

    2011-01-01

    A collimated-hole structure consists of a very large number of parallel channels which have each a very small diameter and are closely packed together. Such devices, installed in vacuum systems allow one to separate regions of very different gas pressures. A collimated-hole structure has high transmission for a directed ion beam with low emittance but a very low conductance for rest gas atoms or molecules exhibiting random walk. Therefore it is proposed to use such a structure as one-way valve and/or efficient differential pumping barrier in set-ups using Penning traps. Furthermore, these devices might be very useful to align the axis of a Penning trap with the direction of the magnetic field lines which is essential to avoid systematic uncertainties in high-accuracy mass spectroscopy.

  10. Analyses of different configurations for a multiple rod Nd:YAG system with a one-way travelling probe beam

    International Nuclear Information System (INIS)

    Wang, You; Kan, Hirofumi; Ogawa, Takayo; Wada, Satoshi

    2011-01-01

    In this paper, the birefringence in an LD-side-pumped solid-state laser (LSPSSL) system is studied by using a quasi plane-wave probe beam. The effects on birefringence compensation have been investigated for different coupling systems arranged between two tandem-set rods. Both the aperture obstruction and the thermally induced lens effect have been taken into consideration in the theoretical explanation. It is shown that most birefringence can be successfully removed by using a suitable lens system as well as a quartz 90° rotator. In construction of a real resonator, such performances as the birefringence compensation, the extraction efficiency, and the high-order-mode control must be carefully balanced at the same time. Although the conclusions are based on analyses of a one-way travelling wave, the methodology introduced in this paper is thought to be useful for a stationary-wave design of the laser oscillator

  11. Stellar neutron capture rateskey data for the s process

    Directory of Open Access Journals (Sweden)

    Käppeler F.

    2013-12-01

    Full Text Available Neutron reactions are responsible for the formation of the elements heavier than iron. The corresponding scenarios relate to the He- and C- burning phases of stellar evolution (s process and to supernova explosions (r and p processes. The s process, which is characterized by low neutron densities, operates in or near the valley of β stability and has produced about half of the elemental abundances between Fe and Bi in the solar system and in the Universe. Because the s abundances are essentially determined by the (n, γ cross sections along the reaction path, accurate neutron data constitute the key input for s process studies. Important constraints for the physical conditions at the stellar sites can be inferred by comparison of the abundance patterns from current s-process models with solar system material or presolar grains. The experimental methods for the determination of stellar (n, γ rates are outlined at the example of recent cross section measurements and remaining quests will be discussed with respect to existing laboratory neutron sources and new developments.

  12. Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate

    International Nuclear Information System (INIS)

    Chau, H.F.

    2002-01-01

    A secret key shared through quantum key distribution between two cooperative players is secure against any eavesdropping attack allowed by the laws of physics. Yet, such a key can be established only when the quantum channel error rate due to eavesdropping or imperfect apparatus is low. Here, a practical quantum key distribution scheme by making use of an adaptive privacy amplification procedure with two-way classical communication is reported. Then, it is proven that the scheme generates a secret key whenever the bit error rate of the quantum channel is less than 0.5-0.1√(5)≅27.6%, thereby making it the most error resistant scheme known to date

  13. Vagus nerve stimulation ameliorated deficits in one-way active avoidance learning and stimulated hippocampal neurogenesis in bulbectomized rats.

    Science.gov (United States)

    Gebhardt, Nils; Bär, Karl-Jürgen; Boettger, Michael K; Grecksch, Gisela; Keilhoff, Gerburg; Reichart, Rupert; Becker, Axel

    2013-01-01

    Vagus nerve stimulation (VNS) has been introduced as a therapeutic option for treatment-resistant depression. The neural and chemical mechanisms responsible for the effects of VNS are largely unclear. Bilateral removal of the olfactory bulbs (OBX) is a validated animal model in depression research. We studied the effects of vagus nerve stimulation (VNS) on disturbed one-way active avoidance learning and neurogenesis in the hippocampal dentate gyrus of rats. After a stimulation period of 3 weeks, OBX rats acquired the learning task as controls. In addition, the OBX-related decrease of neuronal differentiated BrdU positive cells in the dentate gyrus was prevented by VNS. This suggests that chronic VNS and changes in hippocampal neurogenesis induced by VNS may also account for the amelioration of behavioral deficits in OBX rats. To the best of our knowledge, this is the first report on the restorative effects of VNS on behavioral function in an animal model of depression that can be compared with the effects of antidepressants. Copyright © 2013 Elsevier Inc. All rights reserved.

  14. Evaluating the far-field sound of a turbulent jet with one-way Navier-Stokes equations

    Science.gov (United States)

    Pickering, Ethan; Rigas, Georgios; Towne, Aaron; Colonius, Tim

    2017-11-01

    The one-way Navier-Stokes (OWNS) method has shown promising ability to predict both near field coherent structures (i.e. wave packets) and far field acoustics of turbulent jets while remaining computationally efficient through implementation of a spatial marching scheme. Considering the speed and relative accuracy of OWNS, a predictive model for various jet configurations may be conceived and applied for noise control. However, there still remain discrepancies between OWNS and large eddy simulation (LES) databases which may be linked to the previous neglect of nonlinear forcing. Therefore, to better predict wave packets and far field acoustics, this study investigates the effect of nonlinear forcing terms derived from high-fidelity LES databases. The results of the nonlinear forcings are evaluated for several azimuthal modes and frequencies, as well as compared to LES derived acoustics using spectral proper orthogonal decomposition (SPOD). This research was supported by the Department of Defense (DoD) through the Office of Naval Research (Grant No. N00014-16-1-2445) and the National Defense Science & Engineering Graduate Fellowship (NDSEG) Program.

  15. No-go theorem for one-way quantum computing on naturally occurring two-level systems

    International Nuclear Information System (INIS)

    Chen Jianxin; Chen Xie; Duan Runyao; Ji Zhengfeng; Zeng Bei

    2011-01-01

    The ground states of some many-body quantum systems can serve as resource states for the one-way quantum computing model, achieving the full power of quantum computation. Such resource states are found, for example, in spin-(5/2) and spin-(3/2) systems. It is, of course, desirable to have a natural resource state in a spin-(1/2), that is, qubit system. Here, we give a negative answer to this question for frustration-free systems with two-body interactions. In fact, it is shown to be impossible for any genuinely entangled qubit state to be a nondegenerate ground state of any two-body frustration-free Hamiltonian. What is more, we also prove that every spin-(1/2) frustration-free Hamiltonian with two-body interaction always has a ground state that is a product of single- or two-qubit states. In other words, there cannot be any interesting entanglement features in the ground state of such a qubit Hamiltonian.

  16. Assessing Fan Flutter Stability in Presence of Inlet Distortion Using One-Way and Two-Way Coupled Methods

    Science.gov (United States)

    Herrick, Gregory P.

    2014-01-01

    Concerns regarding noise, propulsive efficiency, and fuel burn are inspiring aircraft designs wherein the propulsive turbomachines are partially (or fully) embedded within the airframe; such designs present serious concerns with regard to aerodynamic and aeromechanic performance of the compression system in response to inlet distortion. Previously, a preliminary design of a forward-swept high-speed fan exhibited flutter concerns in clean-inlet flows, and the present author then studied this fan further in the presence of off-design distorted in-flows. Continuing this research, a three-dimensional, unsteady, Navier-Stokes computational fluid dynamics code is again applied to analyze and corroborate fan performance with clean inlet flow and now with a simplified, sinusoidal distortion of total pressure at the aerodynamic interface plane. This code, already validated in its application to assess aerodynamic damping of vibrating blades at various flow conditions using a one-way coupled energy-exchange approach, is modified to include a two-way coupled timemarching aeroelastic simulation capability. The two coupling methods are compared in their evaluation of flutter stability in the presence of distorted in-flows.

  17. A comparative study on the effectiveness of one-way printed communication versus videophone interactive interviews on health promotion.

    Science.gov (United States)

    Homma, Satoki; Imamura, Haruhiko; Nakamura, Toru; Fujimura, Kaori; Ito, Yoshihiro; Maeda, Yuji; Kaneko, Ikuyo

    2016-01-01

    We performed a comparative study of a health education programme that was delivered either through one-way communication with printed media, or through interactive videophone interviews. We aimed to ascertain which mode of counselling, when used in combination with telemonitoring, is more effective at lifestyle modification intended to improve health status. Participants, who were residents of Kurihara city in Miyagi prefecture, Japan, were randomized into two groups: one group received individualized monthly documented reports (n = 33; 22 females; average age: 67.2 years), and the other received interactive videophone communication (n = 35; 22 females; average age: 65.1 years) for three months. Telemonitoring was conducted on both groups, using a pedometer, weighing scale and a sphygmomanometer. Pre- and post-intervention, anthropometric measurements and blood tests were performed; the participants also completed self-administered questionnaires. The two groups showed similar degrees of health status improvement and satisfaction levels. However, the participants in the videophone group were more aware of improvements in their lifestyles than were the participants in the document group. The individualized printed communication programme was less time-consuming compared to videophone communication. Further studies are needed to formulate a balanced protocol for a counselling-cum-telemonitoring programme that provides optimal health improvement and cost performance with the available human resources. © The Author(s) 2015.

  18. Two-way against one-way nesting for climate downscaling in Europe and the Mediterranean region using LMDZ4

    Science.gov (United States)

    Li, Shan; Li, Laurent; Le Treut, Hervé

    2016-04-01

    In the 21st century, the estimated surface temperature warming projected by General Circulation Models (GCMs) is between 0.3 and 4.8 °C, depending on the scenario considered. GCMs exhibit a good representation of climate on a global scale, but they are not able to reproduce regional climate processes with the same level of accuracy. Society and policymakers need model projections to define climate change adaptation and mitigation policies on a global, regional and local scale. Climate downscaling is mostly conducted with a regional model nested into the outputs of a global model. This one-way nesting approach is generally used in the climate community without feedbacks from Regional Climate Models (RCMs) to GCMs. This lack of interaction between the two models may affect regional modes of variability, in particular those with a boundary conflict. The objective of this study is to evaluate a two-way nesting configuration that makes an interactive coupling between the RCM and the GCM, an approach against the traditional configuration of one-way nesting system. An additional aim of this work is to examine if the two-way nesting system can improve the RCM performance. The atmospheric component of the IPSL integrated climate model (LMDZ) is configured at both regional (LMDZ-regional) and global (LMDZ-global) scales. The two models have the same configuration for the dynamical framework and the physical forcings. The climatology values of sea surface temperature (SST) are prescribed for the two models. The stretched-grid of LMDZ-global is applied to a region defined by Europe, the Mediterranean, North Africa and Western North Atlantic. To ensure a good statistical significance of results, all simulations last at least 80 years. The nesting process of models is performed by a relaxation procedure of a time scale of 90 minutes. In the case of two-way nesting, the exchange between the two models is every two hours. The relaxation procedure induces a boundary conflict

  19. [The relationship between Ridit analysis and rank sum test for one-way ordinal contingency table in medical research].

    Science.gov (United States)

    Wang, Ling; Xia, Jie-lai; Yu, Li-li; Li, Chan-juan; Wang, Su-zhen

    2008-06-01

    To explore several numerical methods of ordinal variable in one-way ordinal contingency table and their interrelationship, and to compare corresponding statistical analysis methods such as Ridit analysis and rank sum test. Formula deduction was based on five simplified grading approaches including rank_r(i), ridit_r(i), ridit_r(ci), ridit_r(mi), and table scores. Practical data set was verified by SAS8.2 in clinical practice (to test the effect of Shiwei solution in treatment for chronic tracheitis). Because of the linear relationship of rank_r(i) = N ridit_r(i) + 1/2 = N ridit_r(ci) = (N + 1) ridit_r(mi), the exact chi2 values in Ridit analysis based on ridit_r(i), ridit_r(ci), and ridit_r(mi), were completely the same, and they were equivalent to the Kruskal-Wallis H test. Traditional Ridit analysis was based on ridit_r(i), and its corresponding chi2 value calculated with an approximate variance (1/12) was conservative. The exact chi2 test of Ridit analysis should be used when comparing multiple groups in the clinical researches because of its special merits such as distribution of mean ridit value on (0,1) and clear graph expression. The exact chi2 test of Ridit analysis can be output directly by proc freq of SAS8.2 with ridit and modridit option (SCORES =). The exact chi2 test of Ridit analysis is equivalent to the Kruskal-Wallis H test, and should be used when comparing multiple groups in the clinical researches.

  20. Investigation of effective thermal conductivity for pebble beds by one-way coupled CFD-DEM method for CFETR WCCB

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Lei [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei, Anhui 230031 (China); University of Science and Technology of China, Hefei, Anhui 230027 (China); Chen, Youhua [University of Science and Technology of China, Hefei, Anhui 230027 (China); Huang, Kai [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei, Anhui 230031 (China); Liu, Songlin, E-mail: slliu@ipp.ac.cn [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei, Anhui 230031 (China); University of Science and Technology of China, Hefei, Anhui 230027 (China)

    2016-05-15

    Highlights: • A CFD-DEM coupled numerical model is built based on the prototypical blanket pebble bed. • The numerical model can be applied to simulate heat transfer of a pebble bed and estimate effective thermal conductivity. • The numerical model agrees well with the theoretical SZB model. • Effective thermal conductivity of pebble beds for WCCB is estimated by the current model. - Abstract: The mono-sized beryllium pebble bed and the multi-sized Li{sub 2}TiO{sub 3}/Be{sub 12}Ti mixed pebble bed are the main schemes for the Water-cooled ceramic breeder blanket (WCCB) of China Fusion Engineering Test Reactor (CFETR). And the effective thermal conductivity (k{sub eff}) of the pebble beds is important to characterize the thermal performance of WCCB. In this study, a one-way coupled CFD-DEM method was employed to simulate heat transfer and estimate k{sub eff}. The geometric topology of a prototypical blanket pebble bed was produced by the discrete element method (DEM). Based on the geometric topology, the temperature distribution and the k{sub eff} were obtained by the computational fluid dynamics (CFD) analysis. The current numerical model presented a good performance to calculate k{sub eff} of the beryllium pebble bed, and according to the modeling of the Li{sub 2}TiO{sub 3}/Be{sub 12}Ti mixed pebble bed, k{sub eff} was estimated with values ranged between 2.0 and 4.0 W/(m∙K).

  1. Estimating the Mean Circulation and Water Exchange of the Gulf of Suez-Red Sea via a Validated One-Way Atmospheric-Hydrodynamic Coupled Model

    Science.gov (United States)

    Eladawy, Ahmed; Shaltout, Mohamed; Sousa, Magda Catarina; Dias, João Miguel; Nadaoka, Kazuo

    2018-05-01

    The Gulf of Suez, Northern Islands protected area, and Hurghada zone are experiencing mega developments in all sectors including tourism, industry, and logistics. The need for moderately accurate near-shore hydrodynamic models is increasing to support the sustainable development of this oceanic area. This can be accomplished by following a nesting approach including the downscaling of global atmospheric and oceanic models into local models using higher resolution datasets. This work aims to present the development of a one-way coupling between atmospheric and hydrodynamic models for the Gulf of Suez (GOS) to understand the local oceanic characteristics and processes. The Regional Climate Model system (RegCM4) is used to simulate moderate resolution atmospheric features and its results are used to force a local dedicated application of Delft3D model. The results indicate that the predicted water level, water temperature, and evaporation accurately follow in situ measurements, remotely sensed data, and re-analysis data. The results suggest that the annual sea surface temperature is averaged at 23 °C, while the annual average of evaporation rates equals 8.02 mm/day. The study suggests that the water level displays a marked seasonal and spatial variation. Moreover, the water balance in the Gulf of Suez was controlled by the difference between inflows and outflows through the Straits of Gubal and by the net precipitation. In addition, the water balance indicated a net loss of approximately 3.9 × 10-3 m of water during 2013. Moreover, the exchange through the Straits of Gubal showed a two-way exchange with a net inflow of 0.0007 Sv, where the outflow dominated in the surface layer along the western coast and the inflow dominated in the lower layers along the middle of the Straits. To conclude, the one-way coupling modeling technique proved to be a reliable tool for studying local features of the GOS region.

  2. Challenging the One-Way Paradigm for More Effective Science Communication: A Critical Review of Two Public Campaigns Addressing Contentious Environmental Issues

    Science.gov (United States)

    McEntee, Marie; Mortimer, Claire

    2013-01-01

    This article examines two large-scale public communication campaigns to explore the appropriateness and effectiveness of using one-way communication in contentious environmental issues. The findings show while one-way communication can be successfully employed in contentious issues, it is not appropriate for all contexts and may contribute to…

  3. What are key determinants of hospital admissions, readmission rate and day case rate within the South African medical schemes population?

    Directory of Open Access Journals (Sweden)

    Nondumiso Gugu Khumalo

    2012-06-01

    Full Text Available  BACKGROUND: In South Africa, private hospitals absorb a high proportion of the total health expenditure on private health care. Between 2008-2010 private hospital expenditure which includes ward fees, theatre fees, consumables, medicines and per diem arrangements consumed between 40.5% and 40.9% of the total benefits paid by medical schemes from the risk pool, whilst in-hospital managed care fees ranged between 1.8% and 2.8% for the equivalent years.OBJECTIVE: The aim of this paper is to highlight key factors contributing to utilisation of hospital services within the medical schemes population and to recommend “appropriate” and cost effective strategies on hospital utilisation management.METHODS: A cross sectional survey informed by retrospective analysis of quantitative data was used. Researchers also triangulated quantitative data with systematic review of literature.RESULTS: The results show that demographic indicators such as age profile, dependency ratio, pensioner ratio and prevalence of chronic conditions are not the only key factors influencing hospital admissions, but rather the effectiveness of each medical scheme in containing hospital admissions is also influenced by available technical capacity on utilisation review and audit as well as the managed care methodology including the philosophy underpinning benefit option design.CONCLUSION: This study highlights the importance of “value based” managed care programs linked to benefit option design in health care utilisation management. The choice of one managed care program over the other often leads to tradeoffs whereby unintended consequences emanate. Medical schemes are therefore encouraged to continuously review their managed care programs to ensure value for money as well as better access and health outcomes.http://dx.doi.org/10.7175/fe.v13i2.207

  4. A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing

    International Nuclear Information System (INIS)

    Walenta, N; Gisin, N; Guinnard, O; Houlmann, R; Korzh, B; Lim, C W; Lunghi, T; Portmann, C; Thew, R T; Burg, A; Constantin, J; Caselunghe, D; Kulesza, N; Legré, M; Monat, L; Soucarros, M; Trinkler, P; Junod, P; Trolliet, G; Vannel, F

    2014-01-01

    We present a compactly integrated, 625 MHz clocked coherent one-way quantum key distribution system which continuously distributes secret keys over an optical fibre link. To support high secret key rates, we implemented a fast hardware key distillation engine which allows for key distillation rates up to 4 Mbps in real time. The system employs wavelength multiplexing in order to run over only a single optical fibre. Using fast gated InGaAs single photon detectors, we reliably distribute secret keys with a rate above 21 kbps over 25 km of optical fibre. We optimized the system considering a security analysis that respects finite-key-size effects, authentication costs and system errors for a security parameter of ε QKD  = 4 × 10 −9 . (paper)

  5. Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment

    Directory of Open Access Journals (Sweden)

    Rameez Asif

    2017-01-01

    Full Text Available There is current significant interest in Fiber-to-the-Home (FTTH networks, that is, end-to-end optical connectivity. Currently, it may be limited due to the presence of last-mile copper wire connections. However, in near future, it is envisaged that FTTH connections will exist, and a key offering would be the possibility of optical encryption that can best be implemented using Quantum Key Distribution (QKD. However, it is very important that the QKD infrastructure is compatible with the already existing networks for a smooth transition and integration with the classical data traffic. In this paper, we report the feasibility of using off-the-shelf telecommunication components to enable high performance Continuous Variable-Quantum Key Distribution (CV-QKD systems that can yield secure key rates in the range of 100 Mbits/s under practical operating conditions. Multilevel phase modulated signals (m-PSK are evaluated in terms of secure key rates and transmission distances. The traditional receiver is discussed, aided by the phase noise cancellation based digital signal processing module for detecting the complex quantum signals. Furthermore, we have discussed the compatibility of multiplexers and demultiplexers for wavelength division multiplexed Quantum-to-the-Home (QTTH network and the impact of splitting ratio is analyzed. The results are thoroughly compared with the commercially available high-cost encryption modules.

  6. Science Teaching Experiences in Informal Settings: One Way to Enrich the Preparation Program for Preservice Science Teachers

    Science.gov (United States)

    Hsu, Pei-Ling

    2016-01-01

    The high attrition rate of new science teachers demonstrates the urgent need to incorporate effective practices in teacher preparation programs to better equip preservice science teachers. The purpose of the study is to demonstrate a way to enrich preservice science teachers' preparation by incorporating informal science teaching practice into…

  7. Eloquence is The Key – the Impact of Monetary Policy Speeches on Exchange Rate Volatility

    Directory of Open Access Journals (Sweden)

    Adrian Cantemir Călin

    2015-06-01

    Full Text Available During the last years the monetary policy initiatives of the main central banks have been profoundly influenced by quantitative easing (QE. Blessing, curse, effective instruments or a simple fad, these unconventional measures have occupied the center stage of academic and public attention. In this context, this paper focuses on a wide set of public speeches delivered by officials belonging to the most relevant central banks. These statements cover a large pallet of topics including areas such as QE, tapering, financial stability, unemployment or interest rates. The aim of this study is to investigate the impact that these speeches have on the volatility of exchange rates. For this purpose, the methodology relies on an econometric event study that incorporates three volatility models and intraday five-minute frequencies. The results indicate the fact that public statements have a clear, evident, significant and robust impact on the observed assets.

  8. Analysis of landslide overgrowing rates at Vaskiny Dachi key site, Central Yamal, Russia

    Science.gov (United States)

    Khomutov, A.

    2009-04-01

    An estimation of overgrowing of landslide-affected slopes by vegetation at three main landslide elements: shear surface, landslide body and "frontal zone" at Vaskiny Dachi key site is presented. Vaskiny Dachi key site is located in the watershed of Se-Yakha and Mordy-Yakha rivers on Central Yamal, Russia. The area is represented by highly-dissected alluvial-lacustrine-marine plains and terraces. The closest to Vaskiny Dachi climate station is Marresale, about 90 km southwest of Vaskiny Dachi, at the Kara sea coast. The weather here is probably somewhat cooler than at Vaskiny Dachi. The average annual (summer) air temperature at Marresale is -8.3° C (4.3° C) ("Russia's Weather" Server). To estimate vegetation cover dynamics on cryogenic landslides at "Vaskiny Dachi", data published by O.Rebristaya and others (1995) were used. Their observations were done in 1991-1993, and were supplemented by further field observations (Leibman et al., 2000, Khomutov & Leibman 2007) and by field and remote sensing observations in 2008. An estimation of vegetation cover dynamics on cryogenic landslides at "Vaskiny Dachi" leads to the following results. Immediately after landsliding in 1989, landslide shear surface was bare without any vegetation, landslide body had initial vegetation, and "frontal zone" was under liquefied sediment masses. "Frontal zone" formed in front of a landslide body, appears as a result of damming of drainage routes by a landslide body with flooding of the shear surface "upstream" of the landslide body, formation of a sedge-cottongrass meadow there, and swamping downstream (Khomutov & Leibman 2007). By 1993, landslide shear surface got overgrown by species subordinate in surrounding initial landscapes (Alopecurus alpinus, Festuca ovina, Calamagrostis neglecta, Poa alpigena ssp. Alpigena, etc.). Landslide body was covered by initial communities which got depressed: vitality of Salix polaris, Vaccinium vitis-idaea was reduced, dead off moss cover and overgrown

  9. An adaptation method to improve secret key rates of time-frequency QKD in atmospheric turbulence channels

    Science.gov (United States)

    Sun, Xiaole; Djordjevic, Ivan B.; Neifeld, Mark A.

    2016-03-01

    Free-space optical (FSO) channels can be characterized by random power fluctuations due to atmospheric turbulence, which is known as scintillation. Weak coherent source based FSO quantum key distribution (QKD) systems suffer from the scintillation effect because during the deep channel fading the expected detection rate drops, which then gives an eavesdropper opportunity to get additional information about protocol by performing photon number splitting (PNS) attack and blocking single-photon pulses without changing QBER. To overcome this problem, in this paper, we study a large-alphabet QKD protocol, which is achieved by using pulse-position modulation (PPM)-like approach that utilizes the time-frequency uncertainty relation of the weak coherent photon state, called here TF-PPM-QKD protocol. We first complete finite size analysis for TF-PPM-QKD protocol to give practical bounds against non-negligible statistical fluctuation due to finite resources in practical implementations. The impact of scintillation under strong atmospheric turbulence regime is studied then. To overcome the secure key rate performance degradation of TF-PPM-QKD caused by scintillation, we propose an adaptation method for compensating the scintillation impact. By changing source intensity according to the channel state information (CSI), obtained by classical channel, the adaptation method improves the performance of QKD system with respect to the secret key rate. The CSI of a time-varying channel can be predicted using stochastic models, such as autoregressive (AR) models. Based on the channel state predictions, we change the source intensity to the optimal value to achieve a higher secret key rate. We demonstrate that the improvement of the adaptation method is dependent on the prediction accuracy.

  10. Free-Space Quantum Key Distribution with a High Generation Rate KTP Waveguide Photon-Pair Source

    Science.gov (United States)

    Wilson, J.; Chaffee, D.; Wilson, N.; Lekki, J.; Tokars, R.; Pouch, J.; Lind, A.; Cavin, J.; Helmick, S.; Roberts, T.; hide

    2016-01-01

    NASA awarded Small Business Innovative Research (SBIR) contracts to AdvR, Inc to develop a high generation rate source of entangled photons that could be used to explore quantum key distribution (QKD) protocols. The final product, a photon pair source using a dual-element periodically- poled potassium titanyl phosphate (KTP) waveguide, was delivered to NASA Glenn Research Center in June of 2015. This paper describes the source, its characterization, and its performance in a B92 (Bennett, 1992) protocol QKD experiment.

  11. Key factors contributing to accident severity rate in construction industry in Iran: a regression modelling approach.

    Science.gov (United States)

    Soltanzadeh, Ahmad; Mohammadfam, Iraj; Moghimbeigi, Abbas; Ghiasvand, Reza

    2016-03-01

    Construction industry involves the highest risk of occupational accidents and bodily injuries, which range from mild to very severe. The aim of this cross-sectional study was to identify the factors associated with accident severity rate (ASR) in the largest Iranian construction companies based on data about 500 occupational accidents recorded from 2009 to 2013. We also gathered data on safety and health risk management and training systems. Data were analysed using Pearson's chi-squared coefficient and multiple regression analysis. Median ASR (and the interquartile range) was 107.50 (57.24- 381.25). Fourteen of the 24 studied factors stood out as most affecting construction accident severity (p<0.05). These findings can be applied in the design and implementation of a comprehensive safety and health risk management system to reduce ASR.

  12. One-way propagation of bulk states and robust edge states in photonic crystals with broken inversion and time-reversal symmetries

    Science.gov (United States)

    Lu, Jin-Cheng; Chen, Xiao-Dong; Deng, Wei-Min; Chen, Min; Dong, Jian-Wen

    2018-07-01

    The valley is a flexible degree of freedom for light manipulation in photonic systems. In this work, we introduce the valley concept in magnetic photonic crystals with broken inversion symmetry. One-way propagation of bulk states is demonstrated by exploiting the pseudo-gap where bulk states only exist at one single valley. In addition, the transition between Hall and valley-Hall nontrivial topological phases is also studied in terms of the competition between the broken inversion and time-reversal symmetries. At the photonic boundary between two topologically distinct photonic crystals, we illustrate the one-way propagation of edge states and demonstrate their robustness against defects.

  13. A Voltammetric Determination of the Rate Constant of a One-Way Homogeneous Chemical Reaction in a System of Two Immiscible Liquid Phases

    Czech Academy of Sciences Publication Activity Database

    Holub, Karel; Brusová, Zuzana; Štulík, K.; Mareček, Vladimír

    2004-01-01

    Roč. 574, č. 1 (2004), s. 101-106 ISSN 0022-0728 R&D Projects: GA ČR GA203/03/0822 Institutional research plan: CEZ:AV0Z4040901 Keywords : liquid|liquid interfaces * homogeneous reaction * voltammetry Subject RIV: CG - Electrochemistry Impact factor: 2.228, year: 2004

  14. Theory of wave propagation in magnetized near-zero-epsilon metamaterials: evidence for one-way photonic states and magnetically switched transparency and opacity.

    Science.gov (United States)

    Davoyan, Arthur R; Engheta, Nader

    2013-12-20

    We study propagation of transverse-magnetic electromagnetic waves in the bulk and at the surface of a magnetized epsilon-near-zero (ENZ) medium in a Voigt configuration. We reveal that in a certain range of material parameters novel regimes of wave propagation emerge; we show that the transparency of the medium can be altered with the magnetization leading either to magnetically induced Hall opacity or Hall transparency of the ENZ. In our theoretical study, we demonstrate that surface waves at the interface between either a transparent or an opaque Hall medium and a homogeneous medium may, under certain conditions, be predominantly one way. Moreover, we predict that one-way photonic surface states may exist at the interface of an opaque Hall ENZ and a regular metal, giving rise to the possibility for backscattering immune wave propagation and isolation.

  15. Free-Space Quantum Key Distribution with a High Generation Rate Potassium Titanyl Phosphate Waveguide Photon-Pair Source

    Science.gov (United States)

    Wilson, Jeffrey D.; Chaffee, Dalton W.; Wilson, Nathaniel C.; Lekki, John D.; Tokars, Roger P.; Pouch, John J.; Roberts, Tony D.; Battle, Philip; Floyd, Bertram M.; Lind, Alexander J.; hide

    2016-01-01

    A high generation rate photon-pair source using a dual element periodically-poled potassium titanyl phosphate (PP KTP) waveguide is described. The fully integrated photon-pair source consists of a 1064-nanometer pump diode laser, fiber-coupled to a dual element waveguide within which a pair of 1064-nanometer photons are up-converted to a single 532-nanometer photon in the first stage. In the second stage, the 532-nanometer photon is down-converted to an entangled photon-pair at 800 nanometer and 1600 nanometer which are fiber-coupled at the waveguide output. The photon-pair source features a high pair generation rate, a compact power-efficient package, and continuous wave (CW) or pulsed operation. This is a significant step towards the long term goal of developing sources for high-rate Quantum Key Distribution (QKD) to enable Earth-space secure communications. Characterization and test results are presented. Details and preliminary results of a laboratory free-space QKD experiment with the B92 protocol are also presented.

  16. The logic of comparative life history studies for estimating key parameters, with a focus on natural mortality rate

    Science.gov (United States)

    Hoenig, John M; Then, Amy Y.-H.; Babcock, Elizabeth A.; Hall, Norman G.; Hewitt, David A.; Hesp, Sybrand A.

    2016-01-01

    There are a number of key parameters in population dynamics that are difficult to estimate, such as natural mortality rate, intrinsic rate of population growth, and stock-recruitment relationships. Often, these parameters of a stock are, or can be, estimated indirectly on the basis of comparative life history studies. That is, the relationship between a difficult to estimate parameter and life history correlates is examined over a wide variety of species in order to develop predictive equations. The form of these equations may be derived from life history theory or simply be suggested by exploratory data analysis. Similarly, population characteristics such as potential yield can be estimated by making use of a relationship between the population parameter and bio-chemico–physical characteristics of the ecosystem. Surprisingly, little work has been done to evaluate how well these indirect estimators work and, in fact, there is little guidance on how to conduct comparative life history studies and how to evaluate them. We consider five issues arising in such studies: (i) the parameters of interest may be ill-defined idealizations of the real world, (ii) true values of the parameters are not known for any species, (iii) selecting data based on the quality of the estimates can introduce a host of problems, (iv) the estimates that are available for comparison constitute a non-random sample of species from an ill-defined population of species of interest, and (v) the hierarchical nature of the data (e.g. stocks within species within genera within families, etc., with multiple observations at each level) warrants consideration. We discuss how these issues can be handled and how they shape the kinds of questions that can be asked of a database of life history studies.

  17. The discussion on a new measure method of radon chamber leak rate

    International Nuclear Information System (INIS)

    Zhang Junkui; Tang Bing

    2010-01-01

    Radon chamber is the third standard radon source. The leak rate is the key parameter for the radon chamber to naturally and safely operate. One way, that measure the leak rate is introduced. The experience result is that the way is simple and veracious to measure the leak rate. (authors)

  18. The Roland De Witte Experiment, R. T. Cahill, and the One-Way Speed of Light (Letters to Progress in Physics

    Directory of Open Access Journals (Sweden)

    Catania J.

    2016-01-01

    Full Text Available In “The Roland De Witte 1991 Experiment (to the Memory of Roland De Witte” (Progr. Phys , 2006, v. 2(3, 60–65, R.T. Cahill gives us a briefing on his view that interferometer measurements and one-way RF coaxial cable propagation-time measure- ments amount to a detection of the anisotropy in the speed of light. However, while I obtain first order propagation delays in calculations for on e-way transit which would show geometric modulation by Earth’s rotation, I do not agree with Cahill’s simplistic equation that relates the modulation solely to the projection of the absolute velocity vector v on the coaxial cable, called v P by Cahill (ibid., p. 61–62. The reader should be warned that Cahill’s equation for ∆ t (ibid., p.63 is crude compared with a full Special Relativistic derivation.

  19. Cooperative effect of random and time-periodic coupling strength on synchronization transitions in one-way coupled neural system: mean field approach.

    Science.gov (United States)

    Jiancheng, Shi; Min, Luo; Chusheng, Huang

    2017-08-01

    The cooperative effect of random coupling strength and time-periodic coupling strengh on synchronization transitions in one-way coupled neural system has been investigated by mean field approach. Results show that cooperative coupling strength (CCS) plays an active role for the enhancement of synchronization transitions. There exist an optimal frequency of CCS which makes the system display the best CCS-induced synchronization transitions, a critical frequency of CCS which can not further affect the CCS-induced synchronization transitions, and a critical amplitude of CCS which can not occur the CCS-induced synchronization transitions. Meanwhile, noise intensity plays a negative role for the CCS-induced synchronization transitions. Furthermore, it is found that the novel CCS amplitude-induced synchronization transitions and CCS frequency-induced synchronization transitions are found.

  20. Three-dimensional one-way bubble tracking method for the prediction of developing bubble-slug flows in a vertical pipe. 1st report, models and demonstration

    International Nuclear Information System (INIS)

    Tamai, Hidesada; Tomiyama, Akio

    2004-01-01

    A three-dimensional one-way bubble tracking method is one of the most promising numerical methods for the prediction of a developing bubble flow in a vertical pipe, provided that several constitutive models are prepared. In this study, a bubble shape, an equation of bubble motion, a liquid velocity profile, a pressure field, turbulent fluctuation and bubble coalescence are modeled based on available knowledge on bubble dynamics. Bubble shapes are classified into four types in terms of bubble equivalent diameter. A wake velocity model is introduced to simulate approaching process among bubbles due to wake entrainment. Bubble coalescence is treated as a stochastic phenomenon with the aid of coalescence probabilities that depend on the sizes of two interacting bubbles. The proposed method can predict time-spatial evolution of flow pattern in a developing bubble-slug flow. (author)

  1. Adaptation of methodology to select structural alternatives of one-way slab in residential building to the guidelines of the European Committee for Standardization (CEN/TC 350)

    Energy Technology Data Exchange (ETDEWEB)

    Fraile-Garcia, Esteban, E-mail: esteban.fraile@unirioja.es [University of La Rioja, Department of Mechanical Engineering (Spain); Ferreiro-Cabello, Javier, E-mail: javier.ferreiro@unirioja.es [University of La Rioja, Department of Mechanical Engineering (Spain); Qualiberica S.L. (Spain); Martinez-Camara, Eduardo, E-mail: eduardo.martinezc@unirioja.es [University of La Rioja, Department of Mechanical Engineering (Spain); Jimenez-Macias, Emilio, E-mail: emilio.jimenez@unirioja.es [University of La Rioja, Department of Electrical Engineering (Spain)

    2015-11-15

    The European Committee for Standardization (CEN) through its Technical Committee CEN/TC-350 is developing a series of standards for assessing the building sustainability, at both product and building levels. The practical application of the selection (decision making) of structural alternatives made by one-way slabs leads to an intermediate level between the product and the building. Thus the present study addresses this problem of decision making, following the CEN guidelines and incorporating relevant aspects of architectural design into residential construction. A life cycle assessment (LCA) is developed in order to obtain valid information for the decision making process (the LCA was developed applying CML methodology although Ecoindicator99 was used in order to facilitate the comparison of the values); this information (the carbon footprint values) is contrasted with other databases and with the information from the Environmental Product Declaration (EPD) of one of the lightening materials (expanded polystyrene), in order to validate the results. Solutions of different column disposition and geometries are evaluated in the three pillars of sustainable construction on residential construction: social, economic and environmental. The quantitative analysis of the variables used in this study enables and facilitates an objective comparison in the design stage by a responsible technician; the application of the proposed methodology reduces the possible solutions to be evaluated by the expert to 12.22% of the options in the case of low values of the column index and to 26.67% for the highest values. - Highlights: • Methodology for selection of structural alternatives in buildings with one-way slabs • Adapted to CEN guidelines (CEN/TC-350) for assessing the building sustainability • LCA is developed in order to obtain valid information for the decision making process. • Results validated comparing carbon footprint, databases and Env. Product Declarations

  2. A test of the one-way isotropy of the speed of light from the T2L2 space experiment

    Science.gov (United States)

    Belli, A.; Exertier, P.; Samain, E.

    2017-12-01

    The Time Transfer by Laser Link (T2L2) space experiment that is currently flying on-board Jason-2 (1335 km of altitude) provides an opportunity to make a test of the isotropy of the speed of light using one-way propagation on a non-laboratory scale. Following the general framework given by te{Mansouri1977}, which permits violations of Einstein special relativity, we study the problem of deducing the isotropy of the speed between two clocks as the orientation path varies relative to an inertial reference frame. The short term stability of the T2L2 ground-to-space time transfer has been established at 5-6 ps at 60 seconds between a hydrogen maser and the on-board oscillator on use for the Jason-2 satellite. Nevertheless, during the satellite pass above a laser ranging station (of around 1000 seconds), the stability of the space oscillator is decreasing in τ^{3/2} that clearly impacts the expected performance of the present test. We thus give insights into certain modelling issues and processes, including time transfer problems which have a bearing on the global error budget. Our goal is to achieve an accuracy of {δc}/{c} ≈ 2-3.10^{-9} locally with a scope for improvement by cumulating numerous passes over the same laser ranging station.

  3. Les aboutissements de la circulation à sens unique dans le discours médical [The Outcomes of one-way circulation in medical discourse

    Directory of Open Access Journals (Sweden)

    Mª Dolores Vivero García

    2010-12-01

    Full Text Available Ce travail concerne le discours médical sur la dépression. L'analyse de la mise en scène de la circulation des connaissancesdans notre corpus montre que ce discours se fonde sur une doxa scientifique construite comme le lieu d'une circulation. Il prend également appui sur une représentation de la maladie supposéepartagée par les destinataires (les médecins généralistes, si bien que l'énonciation se rattache implicitement à un discours doxique relatif à un certain modèle de la dépression.We analyse medical discourse about depressive disorder. Analyse of representation of knowledge circulation shows that this discourse is based on Doxa as a one-way circulation. It is based in the social representation of depressive disorder supposedly shared by interlocutors, that is to say the general practitioners. The enunciation appears as implicitly connected to discourse of one model of depressive disorder.

  4. One-way coupling of an integrated assessment model and a water resources model: evaluation and implications of future changes over the US Midwest

    Science.gov (United States)

    Voisin, N.; Liu, L.; Hejazi, M.; Tesfa, T.; Li, H.; Huang, M.; Liu, Y.; Leung, L. R.

    2013-11-01

    An integrated model is being developed to advance our understanding of the interactions between human activities, terrestrial system and water cycle, and to evaluate how system interactions will be affected by a changing climate at the regional scale. As a first step towards that goal, a global integrated assessment model, which includes a water-demand model driven by socioeconomics at regional and global scales, is coupled in a one-way fashion with a land surface hydrology-routing-water resources management model. To reconcile the scale differences between the models, a spatial and temporal disaggregation approach is developed to downscale the annual regional water demand simulations into a daily time step and subbasin representation. The model demonstrates reasonable ability to represent the historical flow regulation and water supply over the US Midwest (Missouri, Upper Mississippi, and Ohio river basins). Implications for future flow regulation, water supply, and supply deficit are investigated using climate change projections with the B1 and A2 emission scenarios, which affect both natural flow and water demand. Although natural flow is projected to increase under climate change in both the B1 and A2 scenarios, there is larger uncertainty in the changes of the regulated flow. Over the Ohio and Upper Mississippi river basins, changes in flow regulation are driven by the change in natural flow due to the limited storage capacity. However, both changes in flow and demand have effects on the Missouri River Basin summer regulated flow. Changes in demand are driven by socioeconomic factors, energy and food demands, global markets and prices with rainfed crop demand handled directly by the land surface modeling component. Even though most of the changes in supply deficit (unmet demand) and the actual supply (met demand) are driven primarily by the change in natural flow over the entire region, the integrated framework shows that supply deficit over the Missouri River

  5. Cooking temperature is a key determinant of in vitro meat protein digestion rate: investigation of underlying mechanisms.

    Science.gov (United States)

    Bax, Marie-Laure; Aubry, Laurent; Ferreira, Claude; Daudin, Jean-Dominique; Gatellier, Philippe; Rémond, Didier; Santé-Lhoutellier, Véronique

    2012-03-14

    The present study aimed to evaluate the digestion rate and nutritional quality of pig muscle proteins in relation to different meat processes (aging, mincing, and cooking). Under our experimental conditions, aging and mincing had little impact on protein digestion. Heat treatments had different temperature-dependent effects on the meat protein digestion rate and degradation potential. At 70 °C, the proteins underwent denaturation that enhanced the speed of pepsin digestion by increasing enzyme accessibility to protein cleavage sites. Above 100 °C, oxidation-related protein aggregation slowed pepsin digestion but improved meat protein overall digestibility. The digestion parameters defined here open new insights on the dynamics governing the in vitro digestion of meat protein. However, the effect of cooking temperature on protein digestion observed in vitro needs to be confirmed in vivo.

  6. Sticky or Slippery Wetting: Network Formation Conditions Can Provide a One-Way Street for Water Flow on Platinum-cured Silicone.

    Science.gov (United States)

    Wang, Chenyu; Nair, Sithara S; Veeravalli, Sharon; Moseh, Patricia; Wynne, Kenneth J

    2016-06-08

    -temperature end (slippery surface) but became pinned at the low-temperature end (sticky surface) and did not move when the slide was rotated 180°. The surface was therefore a "one-way street" for water droplet flow. Theory provides fundamental understanding for slippery/sticky behavior for gradient S-PDMS and Pt-PDMS coatings. A model for network formation is based on hydrosilylation at high temperature and condensation curing of Si-OH from autoxidation of Si-H at low temperatures. In summary, network formation conditions strongly affect receding contact angles and water adhesion for Sylgard 184 and the filler-free mimic Pt-PDMS. These findings suggest careful control of curing conditions is important to silicones used in microfluidic devices or as biomedical materials. Network-forming conditions also impact bulk mechanical properties for Sylgard 184, but the range that can be obtained has not been critically examined for specific applications.

  7. Individual and Population Level Impact of Key HIV Risk Factors on HIV Incidence Rates in Durban, South Africa.

    Directory of Open Access Journals (Sweden)

    Gita Ramjee

    Full Text Available We aimed to estimate the individual and joint impact of age, marital status and diagnosis with sexually transmitted infections (STIs on HIV acquisition among young women at a population level in Durban, KwaZulu-Natal, South Africa. A total of 3,978 HIV seronegative women were recruited for four biomedical intervention trials from 2002-2009. Point and interval estimates of partial population attributable risk (PAR were used to quantify the proportion of HIV seroconversions which can be prevented if a combination of risk factors is eliminated from a target population. More than 70% of the observed HIV acquisitions were collectively attributed to the three risk factors: younger age (<25 years old, unmarried and not cohabiting with a stable/regular partner and diagnosis with STIs. Addressing these risks requires targeted structural, behavioural, biomedical and cultural interventions in order to impact on unacceptably high HIV incidence rates among young women and the population as a whole.

  8. TT Mutant Homozygote of Kruppel-like Factor 5 Is a Key Factor for Increasing Basal Metabolic Rate and Resting Metabolic Rate in Korean Elementary School Children.

    Science.gov (United States)

    Choi, Jung Ran; Kwon, In-Su; Kwon, Dae Young; Kim, Myung-Sunny; Lee, Myoungsook

    2013-12-01

    We investigated the contribution of genetic variations of KLF5 to basal metabolic rate (BMR) and resting metabolic rate (RMR) and the inhibition of obesity in Korean children. A variation of KLF5 (rs3782933) was genotyped in 62 Korean children. Using multiple linear regression analysis, we developed a model to predict BMR in children. We divided them into several groups; normal versus overweight by body mass index (BMI) and low BMR versus high BMR by BMR. There were no differences in the distributions of alleles and genotypes between each group. The genetic variation of KLF5 gene showed a significant correlation with several clinical factors, such as BMR, muscle, low-density lipoprotein cholesterol, and insulin. Children with the TT had significantly higher BMR than those with CC (p = 0.030). The highest muscle was observed in the children with TT compared with CC (p = 0.032). The insulin and C-peptide values were higher in children with TT than those with CC (p= 0.029 vs. p = 0.004, respectively). In linear regression analysis, BMI and muscle mass were correlated with BMR, whereas insulin and C-peptide were not associated with BMR. In the high-BMR group, we observed that higher muscle, fat mass, and C-peptide affect the increase of BMR in children with TT (p BMR (adjust r(2) = 1.000, p BMR in Korean children. We could make better use of the variation within KLF5 in a future clinical intervention study of obesity.

  9. TT Mutant Homozygote of Is a Key Factor for Increasing Basal Metabolic Rate and Resting Metabolic Rate in Korean Elementary School Children

    Directory of Open Access Journals (Sweden)

    Jung Ran Choi

    2013-12-01

    Full Text Available We investigated the contribution of genetic variations of KLF5 to basal metabolic rate (BMR and resting metabolic rate (RMR and the inhibition of obesity in Korean children. A variation of KLF5 (rs3782933 was genotyped in 62 Korean children. Using multiple linear regression analysis, we developed a model to predict BMR in children. We divided them into several groups; normal versus overweight by body mass index (BMI and low BMR versus high BMR by BMR. There were no differences in the distributions of alleles and genotypes between each group. The genetic variation of KLF5 gene showed a significant correlation with several clinical factors, such as BMR, muscle, low-density lipoprotein cholesterol, and insulin. Children with the TT had significantly higher BMR than those with CC (p = 0.030. The highest muscle was observed in the children with TT compared with CC (p = 0.032. The insulin and C-peptide values were higher in children with TT than those with CC (p= 0.029 vs. p = 0.004, respectively. In linear regression analysis, BMI and muscle mass were correlated with BMR, whereas insulin and C-peptide were not associated with BMR. In the high-BMR group, we observed that higher muscle, fat mass, and C-peptide affect the increase of BMR in children with TT (p < 0.001, p < 0.001, and p = 0.018, respectively, while Rohrer's index could explain the usual decrease in BMR (adjust r2 = 1.000, p < 0.001, respectively. We identified a novel association between TT of KLF5 rs3782933 and BMR in Korean children. We could make better use of the variation within KLF5 in a future clinical intervention study of obesity.

  10. Newborn Survival Case Study in Rwanda - Bottleneck Analysis and Projections in Key Maternal and Child Mortality Rates Using Lives Saved Tool (LiST).

    Science.gov (United States)

    Khurmi, Manpreet Singh; Sayinzoga, Felix; Berhe, Atakilt; Bucyana, Tatien; Mwali, Assumpta Kayinamura; Manzi, Emmanuel; Muthu, Maharajan

    2017-01-01

    The Newborn Survival Case study in Rwanda provides an analysis of the newborn health and survival situation in the country. It reviews evidence-based interventions and coverage levels already implemented in the country; identifies key issues and bottlenecks in service delivery and uptake of services by community/beneficiaries, and provides key recommendations aimed at faster reduction in newborn mortality rate. This study utilized mixed method research including qualitative and quantitative analyses of various maternal and newborn health programs implemented in the country. This included interviewing key stakeholders at each level, field visits and also interviewing beneficiaries for assessment of uptake of services. Monitoring systems such as Health Management Information Systems (HMIS), maternal and newborn death audits were reviewed and data analyzed to aid these analyses. Policies, protocols, various guidelines and tools for monitoring are already in place however, implementation of these remains a challenge e.g. infection control practices to reduce deaths due to sepsis. Although existing staff are quite knowledgeable and are highly motivated, however, shortage of health personnel especially doctors in an issue. New facilities are being operationalized e.g. at Gisenyi, however, the existing facilities needs expansion. It is essential to implement high impact evidence based interventions but coverage levels need to be significantly high in order to achieve higher reduction in newborn mortality rate. Equity approach should be considered in planning so that the services are better implemented and the poor and needy can get the benefits of public health programs.

  11. Calcification rates of the massive coral Siderastrea siderea and crustose coralline algae along the Florida Keys (USA) outer-reef tract

    Science.gov (United States)

    Kuffner, I.B.; Hickey, T.D.; Morrison, J.M.

    2013-01-01

    Coral reefs are degrading on a global scale, and rates of reef-organism calcification are predicted to decline due to ocean warming and acidification. Systematic measurements of calcification over space and time are necessary to detect change resulting from environmental stressors. We established a network of calcification monitoring stations at four managed reefs along the outer Florida Keys Reef Tract (FKRT) from Miami to the Dry Tortugas. Eighty colonies (in two sequential sets of 40) of the reef-building coral, Siderastrea siderea, were transplanted to fixed apparatus that allowed repetitive detachment for buoyant weighing every 6 months. Algal-recruitment tiles were also deployed during each weighing interval to measure net calcification of the crustose coralline algal (CCA) community. Coral-calcification rates were an order of magnitude greater than those of CCA. Rates of coral calcification were seasonal (summer calcification was 53% greater than winter), and corals in the Dry Tortugas calcified 48% faster than those at the other three sites. Linear extension rates were also highest in the Dry Tortugas, whereas percent area of the coral skeletons excavated by bioeroding fauna was lowest. The spatial patterns in net coral calcification revealed here correlate well with Holocene reef thickness along the FKRT and, in part, support the “inimical waters hypothesis” proposed by Ginsburg, Hudson, and Shinn almost 50 yrs ago to explain reef development in this region. Due to the homogeneity in coral-calcification rates among the three main Keys sites, we recommend refinement of this hypothesis and suggest that water-quality variables (e.g., carbonate mineral saturation state, dissolved and particulate organic matter, light attenuation) be monitored alongside calcification in future studies. Our results demonstrate that our calcification monitoring network presents a feasible and worthwhile approach to quantifying potential impacts of ocean acidification

  12. Calcification rates of the massive coral Siderastrea siderea and crustose coralline algae along the Florida Keys (USA) outer-reef tract

    Science.gov (United States)

    Kuffner, I. B.; Hickey, T. D.; Morrison, J. M.

    2013-12-01

    Coral reefs are degrading on a global scale, and rates of reef-organism calcification are predicted to decline due to ocean warming and acidification. Systematic measurements of calcification over space and time are necessary to detect change resulting from environmental stressors. We established a network of calcification monitoring stations at four managed reefs along the outer Florida Keys Reef Tract (FKRT) from Miami to the Dry Tortugas. Eighty colonies (in two sequential sets of 40) of the reef-building coral, Siderastrea siderea, were transplanted to fixed apparatus that allowed repetitive detachment for buoyant weighing every 6 months. Algal-recruitment tiles were also deployed during each weighing interval to measure net calcification of the crustose coralline algal (CCA) community. Coral-calcification rates were an order of magnitude greater than those of CCA. Rates of coral calcification were seasonal (summer calcification was 53 % greater than winter), and corals in the Dry Tortugas calcified 48 % faster than those at the other three sites. Linear extension rates were also highest in the Dry Tortugas, whereas percent area of the coral skeletons excavated by bioeroding fauna was lowest. The spatial patterns in net coral calcification revealed here correlate well with Holocene reef thickness along the FKRT and, in part, support the "inimical waters hypothesis" proposed by Ginsburg, Hudson, and Shinn almost 50 yrs ago to explain reef development in this region. Due to the homogeneity in coral-calcification rates among the three main Keys sites, we recommend refinement of this hypothesis and suggest that water-quality variables (e.g., carbonate mineral saturation state, dissolved and particulate organic matter, light attenuation) be monitored alongside calcification in future studies. Our results demonstrate that our calcification monitoring network presents a feasible and worthwhile approach to quantifying potential impacts of ocean acidification, warming

  13. Decoy-state quantum key distribution with two-way classical postprocessing

    International Nuclear Information System (INIS)

    Ma Xiongfeng; Fung, C.-H.F.; Chen Kai; Lo, H.-K.; Dupuis, Frederic; Tamaki, Kiyoshi

    2006-01-01

    Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD) protocols when a coherent-state source is used. Previously, data postprocessing schemes based on one-way classical communications were considered for use with decoy states. In this paper, we develop two data postprocessing schemes for the decoy-state method using two-way classical communications. Our numerical simulation (using parameters from a specific QKD experiment as an example) results show that our scheme is able to extend the maximal secure distance from 142 km (using only one-way classical communications with decoy states) to 181 km. The second scheme is able to achieve a 10% greater key generation rate in the whole regime of distances. We conclude that decoy-state QKD with two-way classical postprocessing is of practical interest

  14. Towards evidence-based emergency medicine: best BETs from the Manchester Royal Infirmary. BET 3: In a penetrating chest wound is a three-sided dressing or a one-way chest seal better at preventing respiratory complications?

    Science.gov (United States)

    Walthall, Kirsten

    2012-04-01

    A short-cut review was carried out to establish whether the traditional three-sided dressing is better than a one-way chest seal at preventing the respiratory complications from penetrating chest trauma. Only one animal study, two guidelines and two case reports provided published evidence relevant to the question. The author, date and country of publication, patient group studied, study type, relevant outcomes, results and study weaknesses of these papers are tabulated. The clinical bottom line is that there is very little evidence, but that the one-way seals may have practical advantages, particularly in the out-of-hospital setting.

  15. Cogeneration: One way to use biomass efficiently

    International Nuclear Information System (INIS)

    Gustavsson, L.; Johansson, B.

    1993-01-01

    Cogeneration in district heating systems is the most energy-efficient way to convert biomass into heat and electricity with current or nearly commercial technologies. Methanol produced from biomass and used in vehicles instead of petrol or diesel could reduce carbon dioxide emissions nearly as much per unit of biomass as if the biomass were used to replace natural gas for cogeneration, but at some higher cost per unit of carbon dioxide reduction. The most energy-efficient way to use biomass for cogeneration appears to be combined cycle technology, and the world's first demonstration plant is now being built. Potentially, this technology can be used for electricity production in Swedish district heating systems to provide nearly 20% of current Swedish electricity production, while simultaneously reducing carbon dioxide emissions from the district heating systems by some 55%. The heat costs from cogeneration with biomass are higher than the heat costs from fossil fuel plants at current fuel prices. Biomass can only compete with fossil fuel if other advantages, for example a lower environmental impact are considered. (au) (35 refs.)

  16. One way for a virtual nuclear instrumentation

    International Nuclear Information System (INIS)

    Mesa Perez, Guillermo; Arteche, Raul

    1999-01-01

    This article discusses how to write a dynamical laudable VxDs for the Microsoft Windows 95 operating system using the VTOOLSD library, VxDs for Windows 95 may be written in C or C++, loading such VxDs using the Win32 application programming interface (API)

  17. One Way to Holland’

    DEFF Research Database (Denmark)

    Marselis, Randi; Schütze, Laura Maria

    2013-01-01

    museums, but is also relevant to ongoing collection practices. An important theme in relation to source communities is ownership and repatriation of cultural objects. Furthermore, working with source communities implies a two-way information process through which groups are given access to memory...

  18. International key comparison of measurements of neutron source emission rate (1999-2005): CCRI(III)-K9.AmBe

    Energy Technology Data Exchange (ETDEWEB)

    Roberts, N.J.; Jones, L.N. [National Physical Laboratory (NPL), Teddington, (United Kingdom); Wang, Z.; Liu, Y.; Wang, Q.; Chen, X.; Luo, H.; Rong, C. [China Institute of Atomic Energy (CIAE), Beijing (China); Kralik, M. [Czech Metrology Institute (CMI), Praha, (Czech Republic); Park, H.; Choi, K.O. [Korea Research Institute of Standards and Science (KRISS), Daejeon, (Korea, Republic of); Pereira, W.W.; Da Fonseca, E.S. [National Laboratory of Metrology of Ionizing Radiation (LNMRI), Rio de Janeiro, (Brazil); Cassette, P. [Laboratoire National Henri Becquerel (LNE-LNHB), Paris, (France); Dewey, M.S. [National Institute of Standards and Technology (NIST), Gaithersburg, MD, (United States); Moiseev, N.N.; Kharitonov, I.A. [D I Mendeleyev Institute for Metrology (VNIIM), St Petersburg, (Russian Federation)

    2011-07-01

    Section III (neutron measurements) of the Comite Consultatif des Rayonnements Ionisants, CCRI, conducted a key comparison of primary measurements of the neutron emission rate of an {sup 241}Am-Be({alpha},n) radionuclide source. A single {sup 241}Am-Be({alpha},n) source was circulated to all the participants between 1999 and 2005. Eight laboratories participated - the CIAE (China), CMI (Czech Republic), KRISS (Republic of Korea), LNMRI (Brazil), LNE-LNHB (France), NIST (USA), NPL (UK) and the VNIIM (Russian Federation) - with the NPL making their measurements at the start and repeating them near the end of the exercise to verify the stability of the source. Each laboratory reported the emission rate into 4{pi} sr together with a detailed uncertainty budget. All participants used the manganese bath technique, with the VNIIM also making measurements using an associated particle technique. The CMI, KRISS, VNIIM, and later the NPL, also measured the anisotropy of the source although this was not a formal part of the comparison. The first draft report was released in May 2006 and having been discussed and modified by the participants and subsequently reviewed by the CCRI(III), the present paper is now the final report of the comparison. (authors)

  19. Security of a practical semi-device-independent quantum key distribution protocol against collective attacks

    International Nuclear Information System (INIS)

    Wang Yang; Bao Wan-Su; Li Hong-Wei; Zhou Chun; Li Yuan

    2014-01-01

    Similar to device-independent quantum key distribution (DI-QKD), semi-device-independent quantum key distribution (SDI-QKD) provides secure key distribution without any assumptions about the internal workings of the QKD devices. The only assumption is that the dimension of the Hilbert space is bounded. But SDI-QKD can be implemented in a one-way prepare-and-measure configuration without entanglement compared with DI-QKD. We propose a practical SDI-QKD protocol with four preparation states and three measurement bases by considering the maximal violation of dimension witnesses and specific processes of a QKD protocol. Moreover, we prove the security of the SDI-QKD protocol against collective attacks based on the min-entropy and dimension witnesses. We also show a comparison of the secret key rate between the SDI-QKD protocol and the standard QKD. (general)

  20. Solid-state one-way photoisomerisation of Z,E,Z-1,6-(4,4'-diphenyl)hexa-1,3,5-triene dicarboxylate examined using higher-order derivative spectra and powder XRD patterns.

    Science.gov (United States)

    Sonoda, Yoriko; Goto, Midori; Ichimura, Kunihiro

    2018-03-14

    Higher order derivative spectra were applied at first to one-way ZEZ-to-EEE photoisomerisation of dimethyl ester (ZEZ-DPH1) of the titled compound in a methylcyclohexane solution. Many common crossing points emerged in UV-induced derivative-spectral changes to reveal the direct ZEZ-to-EEE photoisomerisation without the transient formation of an intermediate to suggest the bicycle-pedal mechanism. The solid-state photoisomerisation was subsequently monitored by tracing changes in the fourth-order derivatives of absorption spectra of a thin crystalline layer of ZEZ-DPH1 prepared by the drop-casting method, because the distortion of absorption spectra due to light scattering is cancelled. It was suggested that the solid-state photochemical event consists of three steps: fast ZEZ-to-EEE photoisomerisation, a subsequent slow ZEZ-to-EEE photoisomerisation and very slow disappearance of the EEE-isomer. Studies on powder XRD were also carried out for a drop-cast solid layer of ZEZ-DPH1 to disclose the coexistence of a crystal form other than the original one, and the former exhibited faster ZEZ-to-EEE photoisomerisation when compared with the original crystal form. The results revealed by XRD analysis are in line with those obtained by higher-order derivative spectra, confirming the solid-state one-way photoisomerisation to take place through the bicycle-pedal process.

  1. A pilot study using scripted ventilation conditions to identify key factors affecting indoor pollutant concentration and air exchange rate in a residence.

    Science.gov (United States)

    Johnson, Ted; Myers, Jeffrey; Kelly, Thomas; Wisbith, Anthony; Ollison, Will

    2004-01-01

    A pilot study was conducted using an occupied, single-family test house in Columbus, OH, to determine whether a script-based protocol could be used to obtain data useful in identifying the key factors affecting air-exchange rate (AER) and the relationship between indoor and outdoor concentrations of selected traffic-related air pollutants. The test script called for hourly changes to elements of the test house considered likely to influence air flow and AER, including the position (open or closed) of each window and door and the operation (on/off) of the furnace, air conditioner, and ceiling fans. The script was implemented over a 3-day period (January 30-February 1, 2002) during which technicians collected hourly-average data for AER, indoor, and outdoor air concentrations for six pollutants (benzene, formaldehyde (HCHO), polycyclic aromatic hydrocarbons (PAH), carbon monoxide (CO), nitric oxide (NO), and nitrogen oxides (NO(x))), and selected meteorological variables. Consistent with expectations, AER tended to increase with the number of open exterior windows and doors. The 39 AER values measured during the study when all exterior doors and windows were closed varied from 0.36 to 2.29 h(-1) with a geometric mean (GM) of 0.77 h(-1) and a geometric standard deviation (GSD) of 1.435. The 27 AER values measured when at least one exterior door or window was opened varied from 0.50 to 15.8 h(-1) with a GM of 1.98 h(-1) and a GSD of 1.902. AER was also affected by temperature and wind speed, most noticeably when exterior windows and doors were closed. Results of a series of stepwise linear regression analyses suggest that (1) outdoor pollutant concentration and (2) indoor pollutant concentration during the preceding hour were the "variables of choice" for predicting indoor pollutant concentration in the test house under the conditions of this study. Depending on the pollutant and ventilation conditions, one or more of the following variables produced a small, but

  2. An improved two-way continuous-variable quantum key distribution protocol with added noise in homodyne detection

    International Nuclear Information System (INIS)

    Sun Maozhu; Peng Xiang; Guo Hong

    2013-01-01

    We propose an improved two-way continuous-variable quantum key distribution (CV QKD) protocol by adding proper random noise on the receiver’s homodyne detection, the security of which is analysed against general collective attacks. The simulation result under the collective entangling cloner attack indicates that despite the correlation between two-way channels decreasing the secret key rate relative to the uncorrelated channels slightly, the performance of the two-way protocol is still far beyond that of the one-way protocols. Importantly, the added noise in detection is beneficial for the secret key rate and the tolerable excess noise of this two-way protocol. With the reasonable reconciliation efficiency of 90%, the two-way CV QKD with added noise allows the distribution of secret keys over 60 km fibre distance. (paper)

  3. Quantum key distribution with two-segment quantum repeaters

    Energy Technology Data Exchange (ETDEWEB)

    Kampermann, Hermann; Abruzzo, Silvestre; Bruss, Dagmar [Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2014-07-01

    Quantum repeaters represent one possible way to achieve long-distance quantum key distribution. One way of improving the repeater rate and decreasing the memory coherence time is the usage of multiplexing. Motivated by the experimental fact that long-range connections are practically demanding, we extend the analysis of the quantum repeater multiplexing protocol to the case of short-range connections. We derive formulas for the repeater rate and we show that short-range connections lead to most of the benefits of a full-range multiplexing protocol. A less demanding QKD-protocol without quantum memories was recently introduced by Lo et al. We generalize this measurement-device-independent quantum key Distribution protocol to the scenario where the repeater Station contains also heralded quantum memories. We assume either single-photon sources or weak coherent pulse sources plus decay states. We show that it is possible to significantly outperform the original proposal, even in presence of decoherence of the quantum memory. We give formulas in terms of device imperfections i.e., the quantum bit error rate and the repeater rate.

  4. Measurement of key resonances for the 24Al(p ,γ )25Si reaction rate using in-beam γ -ray spectroscopy

    Science.gov (United States)

    Longfellow, B.; Gade, A.; Brown, B. A.; Richter, W. A.; Bazin, D.; Bender, P. C.; Bowry, M.; Elman, B.; Lunderberg, E.; Weisshaar, D.; Williams, S. J.

    2018-05-01

    Energy levels and branching ratios for the rp-process nucleus 25Si were determined from the reactions 9Be(26Si,25Si)X and 9Be(25Al,25Si)X using in-beam γ -ray spectroscopy with both high-efficiency and high-resolution detector arrays. Proton-unbound states at 3695(14) and 3802(11) keV were identified and assigned tentative spins and parities based on comparison to theory and the mirror nucleus. The 24Al(p ,γ )25Si reaction rate was calculated using the experimental states and states from charge-dependent USDA and USDB shell-model calculations with downward shifts of the 1 s1 /2 proton orbital to account for the observed Thomas-Ehrman shift, leading to a factor of 10-100 increase in rate for the temperature region of 0.22 GK as compared to a previous calculation. These shifts may be applicable to neighboring nuclei, impacting the proton capture rates in this region of the chart.

  5. Migratory timing, rate, routes and wintering areas of White-crested Elaenia (Elaenia albiceps chilensis, a key seed disperser for Patagonian forest regeneration.

    Directory of Open Access Journals (Sweden)

    Susana Patricia Bravo

    Full Text Available Migratory animals often play key ecological roles within the communities they visit throughout their annual journeys. As a consequence of the links between biomes mediated by migrants, changes in one biome could affect remote areas in unpredictable ways. Migratory routes and timing of most Neotropical austral migrants, which breed at south temperate latitudes of South America and overwinter closer to or within tropical latitudes of South America, have yet to be described in detail. As a result, our understanding about how these birds provide links between South American biomes is almost non-existent. White-crested Elaenia (Elaenia albiceps chilensis is a long-distance austral migrant that breeds in the Patagonian Forest biome and overwinters in tropical South America. Because this small flycatcher plays a key role in the regeneration of this ecosystem, our objective was to describe the annual cycle of White-crested elaenias to evaluate the degree of migratory connectivity between breeding and wintering areas and therefore to determine if there are specific biomes of northern South America linked by elaenias to Patagonian forests. Fifteen individuals were successfully tracked throughout a complete migration cycle using miniature light-level geolocators. All individuals resided and moved through the same general regions. During fall (March-April-May, elaenias were located in the Caatinga and the Atlantic Forest biomes, from Rio de Janeiro to the region near Salvador da Bahia, Brazil. During winter (June-July-Aug., birds were located further inland, within the Cerrado biome. Birds used three different routes during fall migration. Our results indicate that some individuals use a direct route, flying between 500-600 km/day, crossing desert and grasslands, while others took a detour, flying 100-200 km/day through forested areas with refueling opportunities. All birds used the Yunga forest during spring migration, with ten out of 15 individuals

  6. Key issues

    International Nuclear Information System (INIS)

    Cook, N.G.W.

    1980-01-01

    Successful modeling of the thermo-mechanical and hydrochemical behavior of radioactive waste repositories in hard rock is possible in principle. Because such predictions lie outside the realm of experience, their adequacy depends entirely upon a thorough understanding of three fundamental questions: an understanding of the chemical and physical processess that determine the behavior of rock and all its complexities; accurate and realistic numerical models of the geologic media within which a repository may be built; and sufficient in-situ data covering the entire geologic region affected by, or effecting the behavior of a repository. At present sufficient is known to be able to identify most of those areas which require further attention. These areas extend all the way from a complete understanding of the chemical and physical processes determining the behavior of rock through to the exploration mapping and testing that must be done during the development of any potential repository. Many of the techniques, laboratory equipment, field instrumentation, and numerical methods needed to accomplish this do not exist at present. Therefore it is necessary to accept that a major investment in scientific research is required to generate this information over the next few years. The spectrum of scientific and engineering activities is wide extending from laboratory measurements through the development of numerical models to the measurement of data in-situ, but there is every prospect that sufficient can be done to resolve these key issues. However, to do so requires overt recognition of the many gaps which exist in our knowledge and abilities today, and of the need to bridge these gaps and of the significant costs involved in doing so

  7. Mitigation of Control Channel Jamming via Combinatorial Key Distribution

    Science.gov (United States)

    Falahati, Abolfazl; Azarafrooz, Mahdi

    The problem of countering control channel jamming against internal adversaries in wireless ad hoc networks is addressed. Using combinatorial key distribution, a new method to secure the control channel access is introduced. This method, utilizes the established keys in the key establishment phase to hide the location of control channels without the need for a secure BS. This is in obtained by combination of a collision free one-way function and a combinatorial key establishment method. The proposed scheme can be considered as a special case of the ALOHA random access schemes which uses the common established keys as its seeds to generate the pattern of transmission.

  8. Information-theoretic security proof for quantum-key-distribution protocols

    International Nuclear Information System (INIS)

    Renner, Renato; Gisin, Nicolas; Kraus, Barbara

    2005-01-01

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel

  9. Information-theoretic security proof for quantum-key-distribution protocols

    Science.gov (United States)

    Renner, Renato; Gisin, Nicolas; Kraus, Barbara

    2005-07-01

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel.

  10. The emotional importance of key: do Beatles songs written in different keys convey different emotional tones?

    Science.gov (United States)

    Whissel, R; Whissel, C

    2000-12-01

    Lyrics from 155 songs written by the Lennon-McCartney team were scored using the Dictionary of Affect in Language. Resultant scores (pleasantness, activation, and imagery of words) were compared across key signatures using one way analyses of variance. Words from songs written in minor keys were less pleasant and less active than those from songs written in major keys. Words from songs written in the key of F scored extremely low on all three measures. Lyrics from the keys of C, D, and G were relatively active in tone. Results from Dictionary scoring were compared with assignments of character to keys made more than one century ago and with current musicians' opinions.

  11. SHAMROCK: A Synthesizable High Assurance Cryptography and Key Management Coprocessor

    Science.gov (United States)

    2016-11-01

    cryptographic functions such as Advanced Encryption Standard ( AES ) [5] to produce keywraps to orchestrate key exchanges between groups of devices. These...Storage (MPMS). This is done for two reasons: first, the mission package is encrypted using AES keywrap mode with the CEK [7], which is a special version...Zone 1) denoting ephemeral secrets such as dynamic keys. AES encryption is employed as a one-way function leading from the ephemeral Zone 1 to the

  12. GENERALIZED MATRIXES OF GALOIS PROTOCOLS EXCHANGE ENCRYPTION KEYS

    Directory of Open Access Journals (Sweden)

    Anatoly Beletsky

    2016-03-01

    Full Text Available The methods of construction of matrix formation the secret protocols legalized subscribers of public communications networks encryption keys. Based key exchange protocols laid asymmetric cryptography algorithms. The solution involves the calculation of one-way functions and is based on the use of generalized Galois arrays of isomorphism relationship with forming elements, and depending on the selected irreducible polynomial generating matrix. A simple method for constructing generalized Galois matrix by the method of filling the diagonal. In order to eliminate the isomorphism of Galois arrays and their constituent elements, limiting the possibility of building one-way functions, Galois matrix subjected to similarity transformation carried out by means of permutation matrices. The variant of the organization of the algebraic attacks on encryption keys sharing protocols and discusses options for easing the consequences of an attack.

  13. Continuous-variable quantum key distribution in uniform fast-fading channels

    Science.gov (United States)

    Papanastasiou, Panagiotis; Weedbrook, Christian; Pirandola, Stefano

    2018-03-01

    We investigate the performance of several continuous-variable quantum key distribution protocols in the presence of uniform fading channels. These are lossy channels whose transmissivity changes according to a uniform probability distribution. We assume the worst-case scenario where an eavesdropper induces a fast-fading process, where she chooses the instantaneous transmissivity while the remote parties may only detect the mean statistical effect. We analyze coherent-state protocols in various configurations, including the one-way switching protocol in reverse reconciliation, the measurement-device-independent protocol in the symmetric configuration, and its extension to a three-party network. We show that, regardless of the advantage given to the eavesdropper (control of the fading), these protocols can still achieve high rates under realistic attacks, within reasonable values for the variance of the probability distribution associated with the fading process.

  14. Secret key distillation from shielded two-qubit states

    International Nuclear Information System (INIS)

    Bae, Joonwoo

    2010-01-01

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  15. Deducing trapdoor primitives in public key encryption schemes

    Science.gov (United States)

    Pandey, Chandra

    2005-03-01

    Semantic security of public key encryption schemes is often interchangeable with the art of building trapdoors. In the frame of reference of Random Oracle methodology, the "Key Privacy" and "Anonymity" has often been discussed. However to a certain degree the security of most public key encryption schemes is required to be analyzed with formal proofs using one-way functions. This paper evaluates the design of El Gamal and RSA based schemes and attempts to parallelize the trapdoor primitives used in the computation of the cipher text, thereby magnifying the decryption error δp in the above schemes.

  16. Self-rated Health Status and Related Factors of Workers in Key Sectors of Railway System%铁路重点部门职工自测健康状况及影响因素分析

    Institute of Scientific and Technical Information of China (English)

    崔金玲; 王亚斌; 牟宇; 秦磊; 霍伟; 何朝霞; 胡英琴; 薛淑娟; 吕珊

    2011-01-01

    total score of self-rated health scales and the scores of sub-scales were lowest in attendants of electric locomotive carriage. Attendants, male, age, marital status, irregular working times,long time operation, unfamiliar with new technology and equipment, working at night infrequently were inversely proportional to the score of self-rated health in multiple linear regression analysis. But education was proportional to the score of self-rated health.[ Conclusion ] The level of physical heath of railway workers in key sectors was low. The self-rated health situation related to job title, age, gender, education, martial status, irregular working time, long time operation, unfamiliar with new technology and equipment, working at night infrequently.

  17. Symmetric extension of bipartite quantum states and its use in quantum key distribution with two-way postprocessing

    International Nuclear Information System (INIS)

    Myhr, Geir Ove

    2010-01-01

    Just like we can divide the set of bipartite quantum states into separable states and entangled states, we can divide it into states with and without a symmetric extension. The states with a symmetric extension - which includes all the separable states - behave classically in many ways, while the states without a symmetric extension - which are all entangled - have the potential to exhibit quantum effects. The set of states with a symmetric extension is closed under local quantum operations assisted by one-way classical communication (1-LOCC) just like the set of separable states is closed under local operations assisted by two-way classical communication (LOCC). Because of this, states with a symmetric extension often play the same role in a one-way communication setting as the separable states play in a two-way communication setting. We show that any state with a symmetric extension can be decomposed into a convex combination of states that have a pure symmetric extension. A necessary condition for a state to have a pure symmetric extension is that the spectra of the local and global density matrices are equal. This condition is also sufficient for two qubits, but not for any larger systems. We present a conjectured necessary and sufficient condition for two-qubit states with a symmetric extension. Proofs are provided for some classes of states: rank-two states, states on the symmetric subspace, Bell-diagonal states and states that are invariant under S x S, where S is a phase gate. We also show how the symmetric extension problem for multi-qubit Bell-diagonal states can be simplified and the simplified problem implemented as a semidefinite program. Quantum key distribution protocols such as the six-state protocol and the BB84 protocol effectively gives Alice and Bob Bell-diagonal states that they measure in the standard basis to obtain a raw key which they may then process further to obtain a secret error-free key. When the raw key has a high error rate, the

  18. Symmetric extension of bipartite quantum states and its use in quantum key distribution with two-way postprocessing

    Energy Technology Data Exchange (ETDEWEB)

    Myhr, Geir Ove

    2010-11-08

    Just like we can divide the set of bipartite quantum states into separable states and entangled states, we can divide it into states with and without a symmetric extension. The states with a symmetric extension - which includes all the separable states - behave classically in many ways, while the states without a symmetric extension - which are all entangled - have the potential to exhibit quantum effects. The set of states with a symmetric extension is closed under local quantum operations assisted by one-way classical communication (1-LOCC) just like the set of separable states is closed under local operations assisted by two-way classical communication (LOCC). Because of this, states with a symmetric extension often play the same role in a one-way communication setting as the separable states play in a two-way communication setting. We show that any state with a symmetric extension can be decomposed into a convex combination of states that have a pure symmetric extension. A necessary condition for a state to have a pure symmetric extension is that the spectra of the local and global density matrices are equal. This condition is also sufficient for two qubits, but not for any larger systems. We present a conjectured necessary and sufficient condition for two-qubit states with a symmetric extension. Proofs are provided for some classes of states: rank-two states, states on the symmetric subspace, Bell-diagonal states and states that are invariant under S x S, where S is a phase gate. We also show how the symmetric extension problem for multi-qubit Bell-diagonal states can be simplified and the simplified problem implemented as a semidefinite program. Quantum key distribution protocols such as the six-state protocol and the BB84 protocol effectively gives Alice and Bob Bell-diagonal states that they measure in the standard basis to obtain a raw key which they may then process further to obtain a secret error-free key. When the raw key has a high error rate, the

  19. Security by quantum key distribution and IPSEC (SEQKEIP): feasibility

    International Nuclear Information System (INIS)

    Sfaxi, M.A.; Ghernaouti-Helie, S.; Ribordy, G; Gay, O.

    2005-01-01

    Full text: Classical cryptography algorithms are based on mathematical functions. The robustness of a given cryptosystem is based essentially on the secrecy of its (private) key and the difficulty with which the inverse of its one-way function(s) can be calculated. Unfortunately, there is no mathematical proof that will establish whether it is not possible to find the inverse of a given one-way function. On the contrary, quantum cryptography is a method for sharing secret keys, whose security can be formally demonstrated. It is based on the laws of physics. The possible applications of quantum cryptography are mainly linked to telecommunication services that require very high level of security. Quantum cryptography could be integrated in various existing concepts and protocols. One of the possible use of quantum cryptography is within IPSEC. The aim of this paper is to analyse the feasibility of using quantum cryptography in IPSEC and to present the estimated performances of this solution. (author)

  20. Shared governance: one way to engage employed physicians.

    Science.gov (United States)

    Sanford, Kathleen D

    2012-09-01

    To work better with employed physicians, finance leaders should: Understand classic management theories on what motivates employees. Learn from shared governance models with nurses at Magnet hospitals. Apply best practices in management to all employees, not just physicians.

  1. One-Way Quantum Authenticated Secure Communication Using Rotation Operation

    International Nuclear Information System (INIS)

    Tsai Chia-Wei; Wei Toung-Shang; Hwang Tzonelih

    2011-01-01

    This study proposes a theoretical quantum authenticated secure communication (QASC) protocol using Einstein-Podolsky-Rosen (EPR) entangle state, which enables a sender to send a secure as well as authenticated message to a receiver within only one step quantum transmission without having the classical channels and the certification authority. (general)

  2. Delay or anticipatory synchronization in one-way coupled systems ...

    Indian Academy of Sciences (India)

    1Department of Physics, Indian Institute of Science Education and Research, Pune 411 ... Synchronization; variable time delay; time delay systems; secure communication. .... scheme can be defined as y(t − τ2) = x(t − τ1) or y(t) = x(t − τ1 + τ2).

  3. Guns and Fear: A One-Way Street?

    Science.gov (United States)

    Hauser, Will; Kleck, Gary

    2013-01-01

    Surveys show that more than one half of gun owners report owning their firearm for self-protection. Although research has examined the effect of fear of crime on gun ownership, the issue of reciprocity and temporal order has been largely ignored. Furthermore, the effect of firearm acquisition and relinquishment on fear has not been evaluated…

  4. Ants can learn to forage on one-way trails.

    Directory of Open Access Journals (Sweden)

    Pedro Leite Ribeiro

    Full Text Available The trails formed by many ant species between nest and food source are two-way roads on which outgoing and returning workers meet and touch each other all along. The way to get back home, after grasping a food load, is to take the same route on which they have arrived from the nest. In many species such trails are chemically marked by pheromones providing orientation cues for the ants to find their way. Other species rely on their vision and use landmarks as cues. We have developed a method to stop foraging ants from shuttling on two-way trails. The only way to forage is to take two separate roads, as they cannot go back on their steps after arriving at the food or at the nest. The condition qualifies as a problem because all their orientation cues -- chemical, visual or any other -- are disrupted, as all of them cannot but lead the ants back to the route on which they arrived. We have found that workers of the leaf-cutting ant Atta sexdens rubropilosa can solve the problem. They could not only find the alternative way, but also used the unidirectional traffic system to forage effectively. We suggest that their ability is an evolutionary consequence of the need to deal with environmental irregularities that cannot be negotiated by means of excessively stereotyped behavior, and that it is but an example of a widespread phenomenon. We also suggest that our method can be adapted to other species, invertebrate and vertebrate, in the study of orientation, memory, perception, learning and communication.

  5. One Way or Return? The Journey from Practitioner to Researcher

    Science.gov (United States)

    Buoro, Ivano

    2015-01-01

    The journey from VET practitioner to academic researcher is not an easy one, especially for VET teachers whose educational research training in action and ethnographic research have been inculcated through years of practice. This paper discusses the highlights of the journey from practitioner to practitioner researcher including a discussion of…

  6. Controlled-source seismic interferometry with one way wave fields

    Science.gov (United States)

    van der Neut, J.; Wapenaar, K.; Thorbecke, J. W.

    2008-12-01

    In Seismic Interferometry we generally cross-correlate registrations at two receiver locations and sum over an array of sources to retrieve a Green's function as if one of the receiver locations hosts a (virtual) source and the other receiver location hosts an actual receiver. One application of this concept is to redatum an area of surface sources to a downhole receiver location, without requiring information about the medium between the sources and receivers, thus providing an effective tool for imaging below complex overburden, which is also known as the Virtual Source method. We demonstrate how elastic wavefield decomposition can be effectively combined with controlled-source Seismic Interferometry to generate virtual sources in a downhole receiver array that radiate only down- or upgoing P- or S-waves with receivers sensing only down- or upgoing P- or S- waves. For this purpose we derive exact Green's matrix representations from a reciprocity theorem for decomposed wavefields. Required is the deployment of multi-component sources at the surface and multi- component receivers in a horizontal borehole. The theory is supported with a synthetic elastic model, where redatumed traces are compared with those of a directly modeled reflection response, generated by placing active sources at the virtual source locations and applying elastic wavefield decomposition on both source and receiver side.

  7. One Hundred and One Ways to Infinity: Part 2.

    Science.gov (United States)

    Gardiner, A.

    1980-01-01

    Part 2 considers the limit of a sequence and extends this to include ideas such as continuity, derivative, and integral. The discussion concludes with an example of a finite or "counted completely" set, the Fermat primes. (MK)

  8. More than One Way: Stories of UDL and Inclusive Classrooms

    Science.gov (United States)

    Lowrey, K. Alisa; Hollingshead, Aleksandra; Howery, Kathy; Bishop, John B.

    2017-01-01

    Voices of practitioners are often missing in research studies. This project focused on examining general education teachers' stories as they relate to implementation of Universal Design for Learning (UDL) framework and inclusion of students with moderate to severe intellectual disability. Seven general education teachers from Canada and the United…

  9. Key Performance Indicators in the Evaluation of the Quality of Radiation Safety Programs.

    Science.gov (United States)

    Schultz, Cheryl Culver; Shaffer, Sheila; Fink-Bennett, Darlene; Winokur, Kay

    2016-08-01

    Beaumont is a multiple hospital health care system with a centralized radiation safety department. The health system operates under a broad scope Nuclear Regulatory Commission license but also maintains several other limited use NRC licenses in off-site facilities and clinics. The hospital-based program is expansive including diagnostic radiology and nuclear medicine (molecular imaging), interventional radiology, a comprehensive cardiovascular program, multiple forms of radiation therapy (low dose rate brachytherapy, high dose rate brachytherapy, external beam radiotherapy, and gamma knife), and the Research Institute (including basic bench top, human and animal). Each year, in the annual report, data is analyzed and then tracked and trended. While any summary report will, by nature, include items such as the number of pieces of equipment, inspections performed, staff monitored and educated and other similar parameters, not all include an objective review of the quality and effectiveness of the program. Through objective numerical data Beaumont adopted seven key performance indicators. The assertion made is that key performance indicators can be used to establish benchmarks for evaluation and comparison of the effectiveness and quality of radiation safety programs. Based on over a decade of data collection, and adoption of key performance indicators, this paper demonstrates one way to establish objective benchmarking for radiation safety programs in the health care environment.

  10. Robustness bounds and practical limitations of quantum key distribution

    International Nuclear Information System (INIS)

    Khalique, Aeysha

    2008-01-01

    Quantum information theory is a modern branch of theoretical physics. One of its main goals is to interpret concepts of quantum physics. This leads to a deeper understanding of quantum theory. The most common examples of practical applications of basic quantum theory are quantum computation and quantum cryptography. Quantum cryptography provides secure communication between legitimate users even in the presence of an adversary by making possible the distribution of a secret key. It then allows error correction and privacy amplification, which is elimination of adversary information, through classical communication. In this thesis two important aspects of quantum key distribution are covered, namely robustness bounds with respect to provable entanglement for ideal protocols and practical quantum key distribution using two-way classical communication. In part one of the thesis, ideal quantum key distribution protocols and their robustness in terms of provable entanglement are discussed. The robustness bounds are proved for most general coherent attacks. These bounds for provable entanglement are already known to be 25% for the four-state protocol and 33% for the six-state protocol. We anticipate to provide a region in which the legitimate users share entanglement. This region is large for the four-state protocol and is reduced to a smaller region for the six-state protocol because of additional constraint on it. We also investigate the information cost which the adversary has to pay in order to reach these bounds. In part two we adopt a more practical approach. We investigate the limitation on distance of secure communication because of practical restrictions. In particular we investigate the restrictions due to the lack of single photon sources, the lossy channel and faulty detectors. These practical limitations have already been observed using one-way classical communication between legitimate users. It has been observed that it is actually the dark count rate that

  11. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  12. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  13. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  14. Biometry, the safe key

    Directory of Open Access Journals (Sweden)

    María Fraile-Hurtado

    2010-12-01

    Full Text Available Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  15. Financial Key Ratios

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  16. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  17. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  18. Public Key Infrastructure Study

    National Research Council Canada - National Science Library

    Berkovits, Shimshon

    1994-01-01

    The National Institute of Standards and Technology (NIST) has tasked The MITRE Corporation to study the alternatives for automated management of public keys and of the associated public key certificates for the Federal Government...

  19. The Key Lake project

    International Nuclear Information System (INIS)

    1991-01-01

    Key Lake is located in the Athabasca sand stone basin, 640 kilometers north of Saskatoon, Saskatchewan, Canada. The three sources of ore at Key Lake contain 70 100 tonnes of uranium. Features of the Key Lake Project were described under the key headings: work force, mining, mill process, tailings storage, permanent camp, environmental features, worker health and safety, and economic benefits. Appendices covering the historical background, construction projects, comparisons of western world mines, mining statistics, Northern Saskatchewan surface lease, and Key Lake development and regulatory agencies were included

  20. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  1. Smooth Phase Interpolated Keying

    Science.gov (United States)

    Borah, Deva K.

    2007-01-01

    Smooth phase interpolated keying (SPIK) is an improved method of computing smooth phase-modulation waveforms for radio communication systems that convey digital information. SPIK is applicable to a variety of phase-shift-keying (PSK) modulation schemes, including quaternary PSK (QPSK), octonary PSK (8PSK), and 16PSK. In comparison with a related prior method, SPIK offers advantages of better performance and less complexity of implementation. In a PSK scheme, the underlying information waveform that one seeks to convey consists of discrete rectangular steps, but the spectral width of such a waveform is excessive for practical radio communication. Therefore, the problem is to smooth the step phase waveform in such a manner as to maintain power and bandwidth efficiency without incurring an unacceptably large error rate and without introducing undesired variations in the amplitude of the affected radio signal. Although the ideal constellation of PSK phasor points does not cause amplitude variations, filtering of the modulation waveform (in which, typically, a rectangular pulse is converted to a square-root raised cosine pulse) causes amplitude fluctuations. If a power-efficient nonlinear amplifier is used in the radio communication system, the fluctuating-amplitude signal can undergo significant spectral regrowth, thus compromising the bandwidth efficiency of the system. In the related prior method, one seeks to solve the problem in a procedure that comprises two major steps: phase-value generation and phase interpolation. SPIK follows the two-step approach of the related prior method, but the details of the steps are different. In the phase-value-generation step, the phase values of symbols in the PSK constellation are determined by a phase function that is said to be maximally smooth and that is chosen to minimize the spectral spread of the modulated signal. In this step, the constellation is divided into two groups by assigning, to information symbols, phase values

  2. Wind Turbine Contingency Control Through Generator De-Rating

    Science.gov (United States)

    Frost, Susan; Goebel, Kai; Balas, Mark

    2013-01-01

    Maximizing turbine up-time and reducing maintenance costs are key technology drivers for wind turbine operators. Components within wind turbines are subject to considerable stresses due to unpredictable environmental conditions resulting from rapidly changing local dynamics. In that context, systems health management has the aim to assess the state-of-health of components within a wind turbine, to estimate remaining life, and to aid in autonomous decision-making to minimize damage to the turbine. Advanced contingency control is one way to enable autonomous decision-making by providing the mechanism to enable safe and efficient turbine operation. The work reported herein explores the integration of condition monitoring of wind turbines with contingency control to balance the trade-offs between maintaining system health and energy capture. The contingency control involves de-rating the generator operating point to achieve reduced loads on the wind turbine. Results are demonstrated using a high fidelity simulator of a utility-scale wind turbine.

  3. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  4. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  5. Key improvements to XTR

    NARCIS (Netherlands)

    Lenstra, A.K.; Verheul, E.R.; Okamoto, T.

    2000-01-01

    This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR public key for signature applications can be reduced by a factor of three at the cost of a small one time computation for the

  6. Finite key analysis in quantum cryptography

    International Nuclear Information System (INIS)

    Meyer, T.

    2007-01-01

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes the obtainable key rate for any

  7. Key distillation in quantum cryptography

    Science.gov (United States)

    Slutsky, Boris Aron

    1998-11-01

    Quantum cryptography is a technique which permits two parties to communicate over an open channel and establish a shared sequence of bits known only to themselves. This task, provably impossible in classical cryptography, is accomplished by encoding the data on quantum particles and harnessing their unique properties. It is believed that no eavesdropping attack consistent with the laws of quantum theory can compromise the secret data unknowingly to the legitimate users of the channel. Any attempt by a hostile actor to monitor the data carrying particles while in transit reveals itself through transmission errors it must inevitably introduce. Unfortunately, in practice a communication is not free of errors even when no eavesdropping is present. Key distillation is a technique that permits the parties to overcome this difficulty and establish a secret key despite channel defects, under the assumption that every particle is handled independently from other particles by the enemy. In the present work, key distillation is described and its various aspects are studied. A relationship is derived between the average error rate resulting from an eavesdropping attack and the amount of information obtained by the attacker. Formal definition is developed of the security of the final key. The net throughput of secret bits in a quantum cryptosystem employing key distillation is assessed. An overview of quantum cryptographic protocols and related information theoretical results is also given.

  8. Is the Green Key standard the golden key for sustainability measurement in the hospitality sector?

    NARCIS (Netherlands)

    Rietbergen, M.G.; Van Rheede, A.

    2014-01-01

    The Green Key is an eco-rating program that aims at promoting sustainable business practices in the hospitality sector. The Green Key assesses amongst others the sustainable management of energy, water and waste within hotels and other hospitality firms. The Green Key standard awards points if

  9. Key Facts about Tularemia

    Science.gov (United States)

    ... Submit What's this? Submit Button Key Facts About Tularemia Recommend on Facebook Tweet Share Compartir This fact ... and Prevention (CDC) Tularemia Web site . What is Tularemia? Tularemia is a potentially serious illness that occurs ...

  10. Key technologies book

    International Nuclear Information System (INIS)

    1997-01-01

    In this book can be found all the useful information on the French industry key technologies of the years 2000-2005. 136 technologies at the junction of the science advances and of the markets expectations are divided into 9 sectors. Among them, only 4 are interesting here: the environment, the transports, the materials and the energy. In 1995, the secretary's office of State for industry has published a first synthesis book on these key technologies. This 1997 new key technologies book extends and completes the initial study. For each key technology, an encyclopedic sheet is given. Each sheet combines thus some exact and practical information on: advance state of the technology, market characteristics, development forecasts, occupation and involved sectors, technology acquisition cost, research programs but also contacts of the main concerned efficiency poles. (O.M.)

  11. The Key Lake project

    International Nuclear Information System (INIS)

    Glattes, G.

    1985-01-01

    Aspects of project financing for the share of the Canadian subsidiary of Uranerzbergbau-GmbH, Bonn, in the uranium mining and milling facility at Key Lake, Saskatchewan, by a Canadian bank syndicate. (orig.) [de

  12. A Novel Re-keying Function Protocol (NRFP For Wireless Sensor Network Security

    Directory of Open Access Journals (Sweden)

    Naif Alsharabi

    2008-12-01

    Full Text Available This paper describes a novel re-keying function protocol (NRFP for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs, covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  13. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security

    Science.gov (United States)

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-01-01

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding innetwork processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks. PMID:27873963

  14. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security.

    Science.gov (United States)

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-12-04

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  15. Optimal grazing management strategies: evaluating key concepts ...

    African Journals Online (AJOL)

    Finally, overstocking will override key management initiatives, such as effective recovery periods, leading to rangeland degradation. Thus, in variable climates, stocking rate should be set conservatively to allow easier adaptation of animal numbers to rainfall variability from year to year. We suggest several key concepts that ...

  16. Comparison is key.

    Science.gov (United States)

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  17. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  18. Enhanced Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Baojiang Cui

    2015-01-01

    Full Text Available With rapid development and extensive use of wireless sensor networks (WSNs, it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.

  19. Analysis of the differential-phase-shift-keying protocol in the quantum-key-distribution system

    International Nuclear Information System (INIS)

    Rong-Zhen, Jiao; Chen-Xu, Feng; Hai-Qiang, Ma

    2009-01-01

    The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the coherent differential-phase-shift keying (DPSK) protocols. We consider the secure communication rate of the DPSK protocol against an arbitrary individual attack, including the most commonly considered intercept-resend and photon-number splitting attacks, and concluded that the simple and efficient differential-phase-shift-keying protocol allows for more than 200 km of secure communication distance with high communication rates. (general)

  20. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  1. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  2. Turn key contracts

    International Nuclear Information System (INIS)

    Feretic, D.

    1975-01-01

    The aim of this summary is to point out some specific areas which have to be covered in a turn-key contract and which are of primarily interest to the buyer of a nuclear plant. It will be assumed that the buyer is utility company in a developing country and a plant supplier a company in an industrial country. (orig./FW) [de

  3. Key numbers: Energy

    International Nuclear Information System (INIS)

    1994-01-01

    The key numbers of energy give statistical data related to production, consumption, and to foreign trade of each energy in the World and in France. A chapter is dedicated to environment and brings quantitative elements on pollutant emissions connected to energy uses

  4. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  5. Locks and Keys Service

    CERN Multimedia

    Claude Ducastel

    The GS-LS-SEM section is pleased to inform you that as from Monday 30 November 2009, the opening hours of the Locks and Keys service will be the following: 08h30 - 12h30 / 13h30 - 16:30, Mondays to Fridays. GS-SEM-LS 73333

  6. Subcarrier multiplexing optical quantum key distribution

    International Nuclear Information System (INIS)

    Ortigosa-Blanch, A.; Capmany, J.

    2006-01-01

    We present the physical principles of a quantum key distribution system that opens the possibility of parallel quantum key distribution and, therefore, of a substantial improvement in the bit rate of such systems. Quantum mechanics allows for multiple measurements at different frequencies and thus we exploit this concept by extending the concept of frequency coding to the case where more than one radio-frequency subcarrier is used for independently encoding the bits onto an optical carrier. Taking advantage of subcarrier multiplexing techniques we demonstrate that the bit rate can be greatly improved as parallel key distribution is enabled

  7. Semantic Keys and Reading

    Directory of Open Access Journals (Sweden)

    Zev bar-Lev

    2016-12-01

    Full Text Available Semantic Keys are elements (word-parts of written language that give an iconic, general representation of the whole word’s meaning. In written Sino-Japanese the “radical” or semantic components play this role. For example, the character meaning ‘woman, female’ is the Semantic Key of the character for Ma ‘Mama’ (alongside the phonetic component Ma, which means ‘horse’ as a separate character. The theory of semantic Keys in both graphic and phonemic aspects is called qTheory or nanosemantics. The most innovative aspect of the present article is the hypothesis that, in languages using alphabetic writing systems, the role of Semantic Key is played by consonants, more specifically the first consonant. Thus, L meaning ‘LIFT’ is the Semantic Key of English Lift, Ladle, Lofty, aLps, eLevator, oLympus; Spanish Leva, Lecantarse, aLto, Lengua; Arabic aLLah, and Hebrew① ªeL-ºaL ‘upto-above’ (the Israeli airline, Polish Lot ‘flight’ (the Polish airline; Hebrew ªeL, ªeLohim ‘God’, and haLLeluyah ‘praise-ye God’ (using Parallels, ‘Lift up God’. Evidence for the universality of the theory is shown by many examples drawn from various languages, including Indo-European Semitic, Chinese and Japanese. The theory reveals hundreds of relationships within and between languages, related and unrelated, that have been “Hiding in Plain Sight”, to mention just one example: the Parallel between Spanish Pan ‘bread’ and Mandarin Fan ‘rice’.

  8. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    Science.gov (United States)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-06-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem ( Q P K C) based on the Bell states. By H o l e v o' s theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack ( C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  9. Ancel Keys: a tribute

    Directory of Open Access Journals (Sweden)

    VanItallie Theodore B

    2005-02-01

    Full Text Available Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recognized to be a classic – continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  10. Physician Appraisals: Key Challenges

    Directory of Open Access Journals (Sweden)

    Klich Jacek

    2017-06-01

    Full Text Available The main purpose of the article is to identify key criteria being used for physician appraisals and to find how communication skills of physicians are valued in those appraisals. ScienceDirect and EBSCOhost databases were used for this search. The results show that a physician appraisal is underestimated both theoretically and empirically. The particular gap exists with respect to the communication skills of physicians, which are rarely present in medical training syllabi and physician assessments. The article contributes to the theoretical discourse on physician appraisals and points out at the inconsistency between the high status of physicians as a key hospital resource on the one hand and, on the other hand, at inadequate and poorly researched assessment of their performance with a special emphasis on communication skills. The article may inspire health managers to develop and implement up-to-date assessment forms for physicians and good managerial practices in this respect in hospitals and other health care units.

  11. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  12. Examination of roundwood utilization rates in West Virginia

    Science.gov (United States)

    Shawn T. Grushecky; Jan Wiedenbeck; Curt C. Hassler

    2013-01-01

    Forest harvesting is an integral part of the West Virginia forest economy. This component of the supply chain supports a diverse array of primary and secondary processors. A key metric used to describe the efficiency of the roundwood extraction process is the logging utilization factor (LUF). The LUF is one way managers can discern the overall use of harvested...

  13. X-ray film reject rate analysis at eight selected government hospitals ...

    African Journals Online (AJOL)

    admin

    the quality and efficiency of radiology services is imperative. ... principle). One way of achieving this is through a quality assurance program, which includes procedures that help ..... audit of film rejects and repeats rates in a department.

  14. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  15. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  16. Key aspects congenital infection

    Directory of Open Access Journals (Sweden)

    Yu. V. Lobzin

    2014-01-01

    Full Text Available The key questions to solve the problem of congenital infection in the Russian Federation are: using in national practice over world accepted terminology adapted to the recommendations of the World Health Organization; representation of the modern concepts of an infectious process in the classification of congenital infections; scientific development and introducing in clinical practice the «standard case definitions», applied to different congenital infections; optimization of protocols and clinical guidelines for diagnosis, treatment and prevention of congenital infections; improvement a knowledge in the infectious disease for all  pecialists involved in the risk assessment of congenital infections, manage pregnancy and children. Based on our experience and analysis of publications, the authors suggest possible solutions.

  17. Key figures. Year 2006

    International Nuclear Information System (INIS)

    2006-01-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2006. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  18. Key figures. Year 2005

    International Nuclear Information System (INIS)

    2005-01-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2005. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  19. Key to good fit: body measurement problems specific to key ...

    African Journals Online (AJOL)

    Key to good fit: body measurement problems specific to key dimensions. ... to explore and describe the problems that the South African Clothing Industry currently ... A postal survey was conducted among South African apparel and footwear ...

  20. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Department of Water Resources Development and Management, Indian Institute ... on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). ... nature of flows is clearly understood with the help of advanced instrumentation.

  1. Trojan-horse attacks on quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Gisin, N.; Fasel, S.; Kraus, B.; Zbinden, H.; Ribordy, G.

    2006-01-01

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems

  2. Validation of the Peripheral Ultrasound-guided Vascular Access Rating Scale

    DEFF Research Database (Denmark)

    Primdahl, Stine C.; Weile, Jesper; Clemmesen, Louise

    2018-01-01

    rating scale (P =.029, one-way ANOVA), and the P-UGVA rating scale scores also correlated strongly with the overall performance evaluations (rho=0.87, PPearson correlation). We calculated a pass/fail score of 29, which lead to a theoretical false positive rate of 26.5% and false negative rate of 8...

  3. Metropolitan Quantum Key Distribution with Silicon Photonics

    Directory of Open Access Journals (Sweden)

    Darius Bunandar

    2018-04-01

    Full Text Available Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss. Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalable resource for future formation of metropolitan quantum-secure communications networks.

  4. Metropolitan Quantum Key Distribution with Silicon Photonics

    Science.gov (United States)

    Bunandar, Darius; Lentine, Anthony; Lee, Catherine; Cai, Hong; Long, Christopher M.; Boynton, Nicholas; Martinez, Nicholas; DeRose, Christopher; Chen, Changchen; Grein, Matthew; Trotter, Douglas; Starbuck, Andrew; Pomerene, Andrew; Hamilton, Scott; Wong, Franco N. C.; Camacho, Ryan; Davids, Paul; Urayama, Junji; Englund, Dirk

    2018-04-01

    Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD) encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB) and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss). Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalable resource for future formation of metropolitan quantum-secure communications networks.

  5. Information Theoretic Secret Key Generation: Structured Codes and Tree Packing

    Science.gov (United States)

    Nitinawarat, Sirin

    2010-01-01

    This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…

  6. The SECOQC quantum key distribution network in Vienna

    Science.gov (United States)

    Peev, M.; Pacher, C.; Alléaume, R.; Barreiro, C.; Bouda, J.; Boxleitner, W.; Debuisschert, T.; Diamanti, E.; Dianati, M.; Dynes, J. F.; Fasel, S.; Fossier, S.; Fürst, M.; Gautier, J.-D.; Gay, O.; Gisin, N.; Grangier, P.; Happe, A.; Hasani, Y.; Hentschel, M.; Hübel, H.; Humer, G.; Länger, T.; Legré, M.; Lieger, R.; Lodewyck, J.; Lorünser, T.; Lütkenhaus, N.; Marhold, A.; Matyus, T.; Maurhart, O.; Monat, L.; Nauerth, S.; Page, J.-B.; Poppe, A.; Querasser, E.; Ribordy, G.; Robyr, S.; Salvail, L.; Sharpe, A. W.; Shields, A. J.; Stucki, D.; Suda, M.; Tamas, C.; Themel, T.; Thew, R. T.; Thoma, Y.; Treiber, A.; Trinkler, P.; Tualle-Brouri, R.; Vannel, F.; Walenta, N.; Weier, H.; Weinfurter, H.; Wimberger, I.; Yuan, Z. L.; Zbinden, H.; Zeilinger, A.

    2009-07-01

    In this paper, we present the quantum key distribution (QKD) network designed and implemented by the European project SEcure COmmunication based on Quantum Cryptography (SECOQC) (2004-2008), unifying the efforts of 41 research and industrial organizations. The paper summarizes the SECOQC approach to QKD networks with a focus on the trusted repeater paradigm. It discusses the architecture and functionality of the SECOQC trusted repeater prototype, which has been put into operation in Vienna in 2008 and publicly demonstrated in the framework of a SECOQC QKD conference held from October 8 to 10, 2008. The demonstration involved one-time pad encrypted telephone communication, a secure (AES encryption protected) video-conference with all deployed nodes and a number of rerouting experiments, highlighting basic mechanisms of the SECOQC network functionality. The paper gives an overview of the eight point-to-point network links in the prototype and their underlying technology: three plug and play systems by id Quantique, a one way weak pulse system from Toshiba Research in the UK, a coherent one-way system by GAP Optique with the participation of id Quantique and the AIT Austrian Institute of Technology (formerly ARCAustrian Research Centers GmbH—ARC is now operating under the new name AIT Austrian Institute of Technology GmbH following a restructuring initiative.), an entangled photons system by the University of Vienna and the AIT, a continuous-variables system by Centre National de la Recherche Scientifique (CNRS) and THALES Research and Technology with the participation of Université Libre de Bruxelles, and a free space link by the Ludwig Maximillians University in Munich connecting two nodes situated in adjacent buildings (line of sight 80 m). The average link length is between 20 and 30 km, the longest link being 83 km. The paper presents the architecture and functionality of the principal networking agent—the SECOQC node module, which enables the authentic

  7. The SECOQC quantum key distribution network in Vienna

    International Nuclear Information System (INIS)

    Peev, M; Pacher, C; Boxleitner, W; Happe, A; Hasani, Y; Alleaume, R; Diamanti, E; Barreiro, C; Fasel, S; Gautier, J-D; Gisin, N; Bouda, J; Debuisschert, T; Fossier, S; Dianati, M; Dynes, J F; Fuerst, M; Gay, O; Grangier, P; Hentschel, M

    2009-01-01

    In this paper, we present the quantum key distribution (QKD) network designed and implemented by the European project SEcure COmmunication based on Quantum Cryptography (SECOQC) (2004-2008), unifying the efforts of 41 research and industrial organizations. The paper summarizes the SECOQC approach to QKD networks with a focus on the trusted repeater paradigm. It discusses the architecture and functionality of the SECOQC trusted repeater prototype, which has been put into operation in Vienna in 2008 and publicly demonstrated in the framework of a SECOQC QKD conference held from October 8 to 10, 2008. The demonstration involved one-time pad encrypted telephone communication, a secure (AES encryption protected) video-conference with all deployed nodes and a number of rerouting experiments, highlighting basic mechanisms of the SECOQC network functionality. The paper gives an overview of the eight point-to-point network links in the prototype and their underlying technology: three plug and play systems by id Quantique, a one way weak pulse system from Toshiba Research in the UK, a coherent one-way system by GAP Optique with the participation of id Quantique and the AIT Austrian Institute of Technology (formerly ARC ), an entangled photons system by University of Vienna and the AIT, a continuous-variables system by Centre National de la Recherche Scientifique (CNRS) and THALES Research and Technology with the participation of Universite Libre de Bruxelles, and a free space link by the Ludwig Maximillians University in Munich connecting two nodes situated in adjacent buildings (line of sight 80 m). The average link length is between 20 and 30 km, the longest link being 83 km. The paper presents the architecture and functionality of the principal networking agent-the SECOQC node module, which enables the authentic classical communication required for key distillation, manages the generated key material, determines a communication path between any destinations in the network

  8. Experimental demonstration of subcarrier multiplexed quantum key distribution system.

    Science.gov (United States)

    Mora, José; Ruiz-Alba, Antonio; Amaya, Waldimar; Martínez, Alfonso; García-Muñoz, Víctor; Calvo, David; Capmany, José

    2012-06-01

    We provide, to our knowledge, the first experimental demonstration of the feasibility of sending several parallel keys by exploiting the technique of subcarrier multiplexing (SCM) widely employed in microwave photonics. This approach brings several advantages such as high spectral efficiency compatible with the actual secure key rates, the sharing of the optical fainted pulse by all the quantum multiplexed channels reducing the system complexity, and the possibility of upgrading with wavelength division multiplexing in a two-tier scheme, to increase the number of parallel keys. Two independent quantum SCM channels featuring a sifted key rate of 10 Kb/s/channel over a link with quantum bit error rate <2% is reported.

  9. Fully device-independent conference key agreement

    Science.gov (United States)

    Ribeiro, Jérémy; Murta, Gláucia; Wehner, Stephanie

    2018-02-01

    We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N -partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N -1 . We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N -1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.

  10. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    Science.gov (United States)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  11. Identifying tier one key suppliers.

    Science.gov (United States)

    Wicks, Steve

    2013-01-01

    In today's global marketplace, businesses are becoming increasingly reliant on suppliers for the provision of key processes, activities, products and services in support of their strategic business goals. The result is that now, more than ever, the failure of a key supplier has potential to damage reputation, productivity, compliance and financial performance seriously. Yet despite this, there is no recognised standard or guidance for identifying a tier one key supplier base and, up to now, there has been little or no research on how to do so effectively. This paper outlines the key findings of a BCI-sponsored research project to investigate good practice in identifying tier one key suppliers, and suggests a scalable framework process model and risk matrix tool to help businesses effectively identify their tier one key supplier base.

  12. Security for Key Management Interfaces

    OpenAIRE

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan

    2011-01-01

    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  13. Memory for melody and key in childhood.

    Directory of Open Access Journals (Sweden)

    E Glenn Schellenberg

    Full Text Available After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age.

  14. Memory for melody and key in childhood.

    Science.gov (United States)

    Schellenberg, E Glenn; Poon, Jaimie; Weiss, Michael W

    2017-01-01

    After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults) heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age.

  15. Memory for melody and key in childhood

    Science.gov (United States)

    Poon, Jaimie; Weiss, Michael W.

    2017-01-01

    After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults) heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age. PMID:29077726

  16. Model plant Key Measurement Points

    International Nuclear Information System (INIS)

    Schneider, R.A.

    1984-01-01

    For IAEA safeguards a Key Measurement Point is defined as the location where nuclear material appears in such a form that it may be measured to determine material flow or inventory. This presentation describes in an introductory manner the key measurement points and associated measurements for the model plant used in this training course

  17. Breaking chaotic shift key communication via adaptive key identification

    International Nuclear Information System (INIS)

    Ren Haipeng; Han Chongzhao; Liu Ding

    2008-01-01

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  18. Some Key Principles for Developing Grammar Skills

    Institute of Scientific and Technical Information of China (English)

    张威

    2008-01-01

    Grammar is sometimes defined aft"the way words are put together to make correct sentences"(Ur,2004,P.75).The aim of teaching grammar is to raise the rates of the correctness of language use and help the students transfer the isolated language points to apply language.In this essay,the author introduces two kinds of Conlnlon methods in English grammar class. And there are some key principles in grammar teaching.

  19. A Distributed Shared Key Generation Procedure Using Fractional Keys

    National Research Council Canada - National Science Library

    Poovendran, Radha; Corson, M. S; Baras, J. S

    1998-01-01

    We present a new class of distributed key generation and recovery algorithms suitable for group communication systems where the group membership is either static or slowly time-varying, and must be tightly controlled...

  20. Key parameters controlling radiology departments

    International Nuclear Information System (INIS)

    Busch, Hans-Peter

    2011-01-01

    For radiology departments and outstanding practises control and optimization of processes demand an efficient management based on key data. Systems of key data deliver indicators for control of medical quality, service quality and economics. For practices effectiveness (productivity), for hospitals effectiveness and efficiency are in the focus of economical optimization strategies. Task of daily key data is continuous monitoring of activities and workflow, task of weekly/monthly key data is control of data quality, process quality and achievement of objectives, task of yearly key data is determination of long term strategies (marketing) and comparison with competitors (benchmarking). Key parameters have to be defined clearly and have to be available directly. For generation, evaluation and control of key parameters suitable forms of organization and processes are necessary. Strategies for the future will be directed more to the total processes of treatment. To think in total processes and to steer and optimize with suitable parameters is the challenge for participants in the healthcare market of the future. (orig.)

  1. The Efficacy of Key Performance Indicators in Ontario Universities as Perceived by Key Informants

    Science.gov (United States)

    Chan, Vivian

    2015-01-01

    The Ontario Ministry of Education and Training's Task Force on University Accountability first proposed key performance indicators (KPIs) for colleges and universities in Ontario in the early 1990s. The three main KPIs for Ontario universities are the rates of (1) graduation, (2) employment, and (3) Ontario Student Assistance Program loan default.…

  2. KEY TOPICS IN SPORTS MEDICINE

    Directory of Open Access Journals (Sweden)

    Amir Ali Narvani

    2006-12-01

    Full Text Available Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1 Sports injuries, rehabilitation and injury prevention, 2 Exercise physiology, fitness testing and training, 3 Drugs in sport, 4 Exercise and health promotion, 5 Sport and exercise for special and clinical populations, 6 The psychology of performance and injury. PURPOSE The Key Topics format provides extensive, concise information in an accessible, easy-to-follow manner. AUDIENCE The book is targeted the students and specialists in sports medicine and rehabilitation, athletic training, physiotherapy and orthopaedic surgery. The editors are authorities in their respective fields and this handbook depends on their extensive experience and knowledge accumulated over the years. FEATURES The book contains the information for clinical guidance, rapid access to concise details and facts. It is composed of 99 topics which present the information in an order that is considered logical and progressive as in most texts. Chapter headings are: 1. Functional Anatomy, 2. Training Principles / Development of Strength and Power, 3. Biomechanical Principles, 4. Biomechanical Analysis, 5. Physiology of Training, 6. Monitoring of Training Progress, 7. Nutrition, 8. Hot and Cold Climates, 9. Altitude, 10. Sport and Travelling, 11. Principles of Sport Injury Diagnosis, 12. Principles of Sport and Soft Tissue Management, 13. Principles of Physical Therapy and Rehabilitation, 14. Principles of Sport Injury Prevention, 15. Sports Psychology, 16. Team Sports, 17. Psychological Aspects of Injury in Sport, 18. Injury Repair Process, 19. Basic Biomechanics of Tissue Injury, 20. Plain Film Radiography in Sport, 21. Nuclear Medicine, 22. Diagnostic Ultrasound, 23. MRI Scan, 24. Other Imaging, 5. Head Injury, 26. Eye

  3. Key economic sectors and services

    NARCIS (Netherlands)

    Arent, Douglas J.; Tol, Richard S.J.; Faust, Eberhard; Hella, Joseph P.; Kumar, Surender; Strzepek, Kenneth M.; Tóth, Ferenc L.; Yan, Denghua; Abdulla, Amjad; Kheshgi, Haroon; Xu, He; Ngeh, Julius

    2015-01-01

    Introduction and Context This chapter discusses the implications of climate change on key economic sectors and services, for example, economic activity. Other chapters discuss impacts from a physical, chemical, biological, or social perspective. Economic impacts cannot be isolated; therefore, there

  4. Algorithms for Lightweight Key Exchange.

    Science.gov (United States)

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  5. Key Injury and Violence Data

    Science.gov (United States)

    ... Traumatic Brain Injury Violence Prevention Key Injury and Violence Data Recommend on Facebook Tweet Share Compartir Injuries ... of death among persons 1-44. Injury- and violence-related deaths are only part of the problem ...

  6. Three state quantum key distribution for small keys

    International Nuclear Information System (INIS)

    Batuwantudawe, J.; Boileau, J.-C.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols allow two parties, Alice and Bob, to establish secure keys. The most well-known protocol is BB84, using four distinct states. Recently, Phoenix et al. proposed a three state protocol. We explain the protocol and discuss its security proof. The three state protocol also has an interesting structure that allows for errors estimation from the inconclusive results (i.e.. where Alice and Bob choose different bases). This eliminates the need for sampling, potentially useful when qubits are limited. We discuss the effectiveness of this approach compared to BB84 for the case where a good error estimate is required. (author)

  7. Basic study on the rectangular numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1997-06-01

    The present study was conducted to examine the optimum inter-key spacing of numeric rectangular keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) participated in the experiment. Each subject performed the data entry task using rectangular keys of touch devices. These keys were arranged in both horizontal and vertical layouts. The sizes of the rectangular keys in both layouts were 12 x 21 mm and 15 x 39 mm, and each of the inter-key spacing of each key was 0, 3, 6, 12 and 21 mm. The response time with inter-key spacing of 3 mm was significantly faster than with the inter-key spacing of 0, 12 and 21 mm (p < 0.05). Keys of vertical position produced faster response time than that of horizontal position. The subjective ratings showed that the inter-key spacing of 6 mm was significantly better than the inter-key spacing of 0, 3, 12 and 21 mm (p < 0.05).

  8. Quantum key distribution without alternative measurements

    CERN Document Server

    Cabello, A

    2000-01-01

    Entanglement swapping between Einstein-Podolsky-Rosen (EPR) pairs can be used to generate the same sequence of random bits in two remote places. A quantum key distribution protocol based on this idea is described. The scheme exhibits the following features. (a) It does not require that Alice and Bob choose between alternative measurements, therefore improving the rate of generated bits by transmitted qubit. (b) It allows Alice and Bob to generate a key of arbitrary length using a single quantum system (three EPR pairs), instead of a long sequence of them. (c) Detecting Eve requires the comparison of fewer bits. (d) Entanglement is an essential ingredient. The scheme assumes reliable measurements of the Bell operator. (20 refs).

  9. Privacy amplification for quantum key distribution

    International Nuclear Information System (INIS)

    Watanabe, Yodai

    2007-01-01

    This paper examines classical privacy amplification using a universal family of hash functions. In quantum key distribution, the adversary's measurement can wait until the choice of hash functions is announced, and so the adversary's information may depend on the choice. Therefore the existing result on classical privacy amplification, which assumes the independence of the choice from the other random variables, is not applicable to this case. This paper provides a security proof of privacy amplification which is valid even when the adversary's information may depend on the choice of hash functions. The compression rate of the proposed privacy amplification can be taken to be the same as that of the existing one with an exponentially small loss in secrecy of a final key. (fast track communication)

  10. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin

    2016-01-01

    , for instance), KeyPathwayMiner extracts connected sub-networks containing a high number of active or differentially regulated genes (proteins, metabolites) in the molecular profiles. The web interface at (http://keypathwayminer.compbio.sdu.dk) implements all core functionalities of the KeyPathwayMiner tool set......We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression...... such as data integration, input of background knowledge, batch runs for parameter optimization and visualization of extracted pathways. In addition to an intuitive web interface, we also implemented a RESTful API that now enables other online developers to integrate network enrichment as a web service...

  11. Key Lake spill. Final report

    International Nuclear Information System (INIS)

    1984-03-01

    On January 5, 1984 contaminated water overflowed a storage reservoir at the Key Lake uranium mill onto the ice on a neighboring lake, into a muskeg area and onto a road. Outflow continued for two days, partially undercutting a retaining dyke. This report concludes the spill was the result of poor operation by the Key Lake Mining Corp.. The environmental impact will be minimal after cleanup. Improvements can be made in the regulatory process, and it is necessary to prepare for possible future mishaps

  12. Key World Energy Statistics 2013

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  13. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  14. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  15. Grouted Connections with Shear Keys

    DEFF Research Database (Denmark)

    Pedersen, Ronnie; Jørgensen, M. B.; Damkilde, Lars

    2012-01-01

    This paper presents a finite element model in the software package ABAQUS in which a reliable analysis of grouted pile-to-sleeve connections with shear keys is the particular purpose. The model is calibrated to experimental results and a consistent set of input parameters is estimated so that dif...... that different structural problems can be reproduced successfully....

  16. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  17. Symmetric Key Authentication Services Revisited

    NARCIS (Netherlands)

    Crispo, B.; Popescu, B.C.; Tanenbaum, A.S.

    2004-01-01

    Most of the symmetric key authentication schemes deployed today are based on principles introduced by Needham and Schroeder [15] more than twenty years ago. However, since then, the computing environment has evolved from a LAN-based client-server world to include new paradigms, including wide area

  18. Key World Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  19. [Key informers. When and How?].

    Science.gov (United States)

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  20. The Key to School Security.

    Science.gov (United States)

    Hotle, Dan

    1993-01-01

    In addition to legislative accessibility requirements, other security issues facing school administrators who select a security system include the following: access control; user friendliness; durability or serviceability; life safety precautions; possibility of vandalism, theft, and tampering; and key control. Offers steps to take in considering…

  1. Practical quantum key distribution with polarization-entangled photons

    International Nuclear Information System (INIS)

    Poppe, A.; Fedrizzi, A.; Boehm, H.; Ursin, R.; Loruenser, T.; Peev, M.; Maurhardt, O.; Suda, M.; Kurtsiefer, C.; Weinfurter, H.; Jennewein, T.; Zeilinger, A.

    2005-01-01

    Full text: We present an entangled-state quantum cryptography system that operated for the first time in a real-world application scenario. The full key generation protocol was performed in real-time between two distributed embedded hardware devices, which were connected by 1.45 km of optical fiber, installed for this experiment in the Vienna sewage system. A source for polarization-entangled photons delivered about 8200 entangled photon pairs per second. After transmission to the distant receivers, a mean value of 468 pairs per second remained for the generation of a raw key, which showed an average qubit error rate of 6.4 %. The raw key was sifted and subsequently processed by a classical protocol which included error correction and privacy amplification. The final secure key bit rate was about 76 bits per second. The generated quantum key was then handed over and used by a secure communication application. (author)

  2. Innovations in Delta Differential One-Way Range: from Viking to Mars Science Laboratory

    Science.gov (United States)

    Border, James S.

    2009-01-01

    The Deep Space Network has provided the capability for very-long-baseline interferometry measurements in support of spacecraft navigation since the late 1970s. Both system implementation and the importance of such measurements to flight projects have evolved significantly over the past three decades. Innovations introduced through research and development programs have led to much better performance. This paper provides an overview of the development and use of interferometric tracking techniques in the DSN starting with the Viking era and continuing with a description of the current system and its planned use to support Mars Science Laboratory.

  3. Cohesive cracked-hinge model for simulation of fracture in one-way slabs on grade

    DEFF Research Database (Denmark)

    Skar, Asmus; Poulsen, Peter Noe; Olesen, John Forbes

    2017-01-01

    Numerical analysis of slab on grade structures subjected to mechanical loads is a complex matter often requiring computationally expensive models. In order to develop a simplified and general concept for non-linear analysis of slab on grade structures, this paper presents a cohesive cracked-hinge...

  4. MANCOVA for one way classification with homogeneity of regression coefficient vectors

    Science.gov (United States)

    Mokesh Rayalu, G.; Ravisankar, J.; Mythili, G. Y.

    2017-11-01

    The MANOVA and MANCOVA are the extensions of the univariate ANOVA and ANCOVA techniques to multidimensional or vector valued observations. The assumption of a Gaussian distribution has been replaced with the Multivariate Gaussian distribution for the vectors data and residual term variables in the statistical models of these techniques. The objective of MANCOVA is to determine if there are statistically reliable mean differences that can be demonstrated between groups later modifying the newly created variable. When randomization assignment of samples or subjects to groups is not possible, multivariate analysis of covariance (MANCOVA) provides statistical matching of groups by adjusting dependent variables as if all subjects scored the same on the covariates. In this research article, an extension has been made to the MANCOVA technique with more number of covariates and homogeneity of regression coefficient vectors is also tested.

  5. More than One Way to Tell a Story: Integrating Storytelling into Your Law Course

    Science.gov (United States)

    Steslow, Donna M.; Gardner, Carolyn

    2011-01-01

    Storytelling has been used in diverse educational settings. It is employed at all educational levels, from elementary schools to graduate schools. Approximately twenty years ago, law school professors began writing about the application of storytelling to various law school subjects as an alternative to the traditional case method. Legal scholars…

  6. One Way Multimedia Broadcasting as a Tool for Education and Development in Developing Nations

    Science.gov (United States)

    Chandrasekhar, M. G.; Venugopal, D.; Sebastian, M.; Chari, B.

    2000-07-01

    An improved quality of life through education and developmental communication is an important necessity of societal up-liftment in the new millennium, especially in the developing nations. The population explosion and the associated pressure on the scarce resources to meet the basic necessities have made it more or less impossible for most of the nations to invest reasonable resources in realizing adequate channels of formal education. Thanks to the developments in satellite communication and associated technologies, new vistas are available today to provide education and developmental communication opportunities to millions of people, spread across the globe. Satellite based Digital Audio and Multimedia Broadcasting is one such new development that is being viewed as an innovative space application in the coming decades. The potential of DAB technology to reach education, information and entertainment directly to the user through a specially designed receiver could be efficiently utilized by the developing nations to overcome their difficulties in realizing formal channels of education and information dissemination. WorldSpace plans to launch three geo-stationary satellites that would cover most of the developing economies in Africa, the Mediterranean, the Middle East, Asia, Latin America and the Caribbean. Apart from a variety of digital, high quality audio channels providing news, views, education and entertainment opportunities, the end users can also get a responsive multimedia. The multimedia is being planned as a specially packaged offering that can meet the demand of students, professionals as well as certain special groups who have certain specific data and information requirements. Apart from WorldSpace, renowned agencies/firms from different parts of the world shall provide the required content to meet these requirements. Though the Internet option is available, higher telephone charges and the difficulty in getting access have made this option less interesting and unpopular in most of the developing countries. The proposed digital audio and multimedia offering from WorldSpace to millions of consumers spread across more than 120 countries is considered as a unique tool for education and development, particularly in the developing nations. In this paper, an attempt is made to briefly describe the issues associated with education and development in developing countries, the WorldSpace offering and how a developing nation can benefit from this offering in the coming decades.

  7. One Way to Rein in the Cost of Textbooks: Make Them Free

    Science.gov (United States)

    Delespinasse, Paul F.

    2008-01-01

    The prices for college texts have soared way beyond inflation for the last quarter-century. As such, they have become a burden on today's financially strapped students. From the point of students and of faculty members who are concerned about their students' welfare, the important question is what can be done to drive text prices back down. In…

  8. No One Way: Differentiating School District Leadership and Support for School Improvement

    Science.gov (United States)

    Anderson, Stephen E.; Mascall, Blair; Stiegelbauer, Suzanne; Park, Jaddon

    2012-01-01

    This article examines findings from a qualitative investigation of how school district administrators in four mid to large sized urban school districts (10,000-50,000) identify and address differences in school performance. The analysis explores the interaction between district policies and actions that centralize and standardize expectations for…

  9. One way and the other: the bidirectional relationship between ambivalence and body movement.

    Science.gov (United States)

    Schneider, Iris K; Eerland, Anita; van Harreveld, Frenk; Rotteveel, Mark; van der Pligt, Joop; van der Stoep, Nathan; Zwaan, Rolf A

    2013-03-01

    Prior research exploring the relationship between evaluations and body movements has focused on one-sided evaluations. However, people regularly encounter objects or situations about which they simultaneously hold both positive and negative views, which results in the experience of ambivalence. Such experiences are often described in physical terms: For example, people say they are "wavering" between two sides of an issue or are "torn." Building on this observation, we designed two studies to explore the relationship between the experience of ambivalence and side-to-side movement, or wavering. In Study 1, we used a Wii Balance Board to measure movement and found that people who are experiencing ambivalence move from side to side more than people who are not experiencing ambivalence. In Study 2, we induced body movement to explore the reverse relationship and found that when people are made to move from side to side, their experiences of ambivalence are enhanced.

  10. One way and the other: the bidirectional relationship between ambivalence and body movement

    NARCIS (Netherlands)

    Schneider, I.K.; Eerland, A.; van Harreveld, F.; Rotteveel, M.; van der Pligt, J.; van der Stoep, N.; Zwaan, R.A.

    2013-01-01

    Prior research exploring the relationship between evaluations and body movements has focused on one-sided evaluations. However, people regularly encounter objects or situations about which they simultaneously hold both positive and negative views, which results in the experience of ambivalence. Such

  11. Topologically-protected one-way leaky waves in nonreciprocal plasmonic structures

    Science.gov (United States)

    Hassani Gangaraj, S. Ali; Monticone, Francesco

    2018-03-01

    We investigate topologically-protected unidirectional leaky waves on magnetized plasmonic structures acting as homogeneous photonic topological insulators. Our theoretical analyses and numerical experiments aim at unveiling the general properties of these exotic surface waves, and their nonreciprocal and topological nature. In particular, we study the behavior of topological leaky modes in stratified structures composed of a magnetized plasma at the interface with isotropic conventional media, and we show how to engineer their propagation and radiation properties, leading to topologically-protected backscattering-immune wave propagation, and highly directive and tunable radiation. Taking advantage of the non-trivial topological properties of these leaky modes, we also theoretically demonstrate advanced functionalities, including arbitrary re-routing of leaky waves on the surface of bodies with complex shapes, as well as the realization of topological leaky-wave (nano)antennas with isolated channels of radiation that are completely independent and separately tunable. Our findings help shedding light on the behavior of topologically-protected modes in open wave-guiding structures, and may open intriguing directions for future antenna generations based on topological structures, at microwaves and optical frequencies.

  12. Estimating an Effect Size in One-Way Multivariate Analysis of Variance (MANOVA)

    Science.gov (United States)

    Steyn, H. S., Jr.; Ellis, S. M.

    2009-01-01

    When two or more univariate population means are compared, the proportion of variation in the dependent variable accounted for by population group membership is eta-squared. This effect size can be generalized by using multivariate measures of association, based on the multivariate analysis of variance (MANOVA) statistics, to establish whether…

  13. Optimizing dynamic downscaling in one-way nesting using a regional ocean model

    Science.gov (United States)

    Pham, Van Sy; Hwang, Jin Hwan; Ku, Hyeyun

    2016-10-01

    Dynamical downscaling with nested regional oceanographic models has been demonstrated to be an effective approach for both operationally forecasted sea weather on regional scales and projections of future climate change and its impact on the ocean. However, when nesting procedures are carried out in dynamic downscaling from a larger-scale model or set of observations to a smaller scale, errors are unavoidable due to the differences in grid sizes and updating intervals. The present work assesses the impact of errors produced by nesting procedures on the downscaled results from Ocean Regional Circulation Models (ORCMs). Errors are identified and evaluated based on their sources and characteristics by employing the Big-Brother Experiment (BBE). The BBE uses the same model to produce both nesting and nested simulations; so it addresses those error sources separately (i.e., without combining the contributions of errors from different sources). Here, we focus on discussing errors resulting from the spatial grids' differences, the updating times and the domain sizes. After the BBE was separately run for diverse cases, a Taylor diagram was used to analyze the results and recommend an optimal combination of grid size, updating period and domain sizes. Finally, suggested setups for the downscaling were evaluated by examining the spatial correlations of variables and the relative magnitudes of variances between the nested model and the original data.

  14. Behind the scenes of GS: there’s only one way to go

    CERN Multimedia

    Anaïs Schaeffer

    2014-01-01

    At CERN, all of the Laboratory’s imports and exports are routed in the same way: through the Logistics Service. This GS-IS Group service is responsible for receiving, inspecting and distributing all goods sent to the Organization.   Whether products for the CERN Stores, components for the experiments, tools, machinery and materials for the workshops or equipment for users and members of the personnel, nothing escapes the attention of CERN’s Logistics Service, which every year processes nearly 70,000 incoming deliveries, 7,500 shipments and 160,000 distributed items. “The vast majority of our imports come from CERN Member States,” says imports and customs procedures manager Laurence Planque, “but we are receiving more and more goods for collaborators working at CERN from non-Member States such as China, India and Pakistan. All these imports are entitled to diplomatic exemption, so every day we have to manage the customs clearance procedures wit...

  15. Simulation of three lanes one-way freeway in low visibility weather by possible traffic accidents

    Science.gov (United States)

    Pang, Ming-bao; Zheng, Sha-sha; Cai, Zhang-hui

    2015-09-01

    The aim of this work is to investigate the traffic impact of low visibility weather on a freeway including the fraction of real vehicle rear-end accidents and road traffic capacity. Based on symmetric two-lane Nagel-Schreckenberg (STNS) model, a cellular automaton model of three-lane freeway mainline with the real occurrence of rear-end accidents in low visibility weather, which considers delayed reaction time and deceleration restriction, was established with access to real-time traffic information of intelligent transportation system (ITS). The characteristics of traffic flow in different visibility weather were discussed via the simulation experiments. The results indicate that incoming flow control (decreasing upstream traffic volume) and inputting variable speed limits (VSL) signal are effective in accident reducing and road actual traffic volume's enhancing. According to different visibility and traffic demand the appropriate control strategies should be adopted in order to not only decrease the probability of vehicle accidents but also avoid congestion.

  16. Twenty-one Ways to Develop Esprit De Corps Among Your Student Officials.

    Science.gov (United States)

    Kovalakides, Nick

    Student officials for intramural sports can be given special training to enhance their aptitude in the field, but their attitude is more difficult to develop. This paper suggests 21 ways to develop attitude among student officials. Some of the suggestions are: Athletic departments should emphasize the role of the official in the intramural…

  17. More than one way to see it: Individual heuristics in avian visual computation.

    Science.gov (United States)

    Ravignani, Andrea; Westphal-Fitch, Gesche; Aust, Ulrike; Schlumpp, Martin M; Fitch, W Tecumseh

    2015-10-01

    Comparative pattern learning experiments investigate how different species find regularities in sensory input, providing insights into cognitive processing in humans and other animals. Past research has focused either on one species' ability to process pattern classes or different species' performance in recognizing the same pattern, with little attention to individual and species-specific heuristics and decision strategies. We trained and tested two bird species, pigeons (Columba livia) and kea (Nestor notabilis, a parrot species), on visual patterns using touch-screen technology. Patterns were composed of several abstract elements and had varying degrees of structural complexity. We developed a model selection paradigm, based on regular expressions, that allowed us to reconstruct the specific decision strategies and cognitive heuristics adopted by a given individual in our task. Individual birds showed considerable differences in the number, type and heterogeneity of heuristic strategies adopted. Birds' choices also exhibited consistent species-level differences. Kea adopted effective heuristic strategies, based on matching learned bigrams to stimulus edges. Individual pigeons, in contrast, adopted an idiosyncratic mix of strategies that included local transition probabilities and global string similarity. Although performance was above chance and quite high for kea, no individual of either species provided clear evidence of learning exactly the rule used to generate the training stimuli. Our results show that similar behavioral outcomes can be achieved using dramatically different strategies and highlight the dangers of combining multiple individuals in a group analysis. These findings, and our general approach, have implications for the design of future pattern learning experiments, and the interpretation of comparative cognition research more generally. Copyright © 2015 The Authors. Published by Elsevier B.V. All rights reserved.

  18. Joint Preprocesser-Based Detectors for One-Way and Two-Way Cooperative Communication Networks

    KAUST Repository

    Abuzaid, Abdulrahman I.

    2014-01-01

    Efficient receiver designs for cooperative communication networks are becoming increasingly important. In previous work, cooperative networks communicated with the use of L relays. As the receiver is constrained, channel shortening and reduced

  19. BWR fuel assembly bottom nozzle with one-way coolant flow valve

    International Nuclear Information System (INIS)

    Taleyarkhan, R.P.

    1987-01-01

    In a nuclear reactor having a flow of coolant/moderator fluid therein, at least one fuel assembly installed in the fluid flow, the fuel assembly is described comprising in combination: a bundle of elongated fuel rods disposed in side-by-side relationship so as to form an array of spaced fuel rods; an outer tubular flow channel surrounding the fuel rods so as to direct the flow of coolant/moderator fluid along the fuel rods; bottom and top nozzles mounted at opposite ends of the flow channel and having an inlet and outlet respectively for allowing entry and exit of the flow of coolant/moderator fluid into and from the flow channel and along the fuel rods therein; and a coolant flow direction control device operatively disposed in the bottom nozzle so as to open the inlet thereof to the flow of coolant/moderator fluid in an inflow direction into the flow channel through the bottom nozzle inlet but close the inlet to the flow of coolant/moderator fluid from the flow channel through the bottom nozzle inlet upon reversal of coolant/moderator fluid flow from the inflow direction

  20. A Modest Proposal: One Way to Save Journalism and Journalism Education

    Science.gov (United States)

    John, Jeffrey Alan

    2013-01-01

    This essay suggests that because anyone and everyone can now be a "journalist," the standards of the field of journalism have been greatly diminished. To regain respect for the profession and retain stature in the academy, journalism education should offer an assurance of the legitimacy of journalism program graduates by recognizing only…

  1. Balance in Representation - More Than One Way to Tip the Scales

    Science.gov (United States)

    Rowell, D. S.; Carlis, D. L.

    2017-12-01

    Too often diversity balance is seen as purely a numbers issue - one of influx and totals. And thus recruiting and retention being two sides of the same valuable coin. However, balance is not just numbers. There is more than one means to add diversity value to an organization. Numbers is one, but power is another. `Balance' is also reached through empowerment and voice. Whereas recruiting and retention can be seen as hard currency buying balanced demographics, empowerment is an investment that takes various forms and yields various dividends. Empowerment includes investment in people, and training, and systems, and pays dividends in performance, and voice, and careers, and service. In this way space is created for the benefits of diversity even where numbers and composition is statically unyielding. Equilibrium comes from tipping the scales with involvement, impact and affect. And finally in coming back full circle, empowerment has a bonus direct effect on the numbers, as it does improve diverse recruiting and retention. This presentation places a focus on balance in terms of gender efficacy. It will highlight the requirements to grow and mature gender empowerment investments and show how these investments have diversity dividends. And finally the presentation will note how NWS is taking a multi-faceted approach to diversity to achieve `balance' through empowerment, involvement, (gender) mainstreaming, training, etc…, and of course recruiting and retention.

  2. One-way gates based on EPR, GHZ and decoherence-free states of W class

    International Nuclear Information System (INIS)

    Basharov, A.M.; Gorbachev, V.N.; Trubilko, A.I.; Yakovleva, E.S.

    2009-01-01

    The logical gates using quantum measurement as a primitive of quantum computation are considered. It is found that these gates achieved with EPR, GHZ and W entangled states have the same structure, allow encoding the classical information into states of quantum system and can perform any calculations. A particular case of decoherence-free W states is discussed as in this very case the logical gate is decoherence-free.

  3. Egocentric framing - one way people may fail in a switch dilemma: evidence from excessive lane switching.

    Science.gov (United States)

    Navon, David; Kaplan, Todd R; Kasten, Ronen

    2013-11-01

    To study switching behavior, an experiment mimicking the state of a driver on the road was conducted. In each trial participants were given a chance to switch lanes. Despite the fact that lane switching had no sound rational basis, participants often switched lanes when the speed of driving in their lane on the previous trial was relatively slow. That tendency was discerned even when switching behavior had been sparsely reinforced, and was especially marked in almost a third of the participants, who manifested it consistently. The findings illustrate a type of behavior occurring in various contexts (e.g., stocks held in a portfolio, conduct pertinent for residual life expectancy, supermarket queues). We argue that this behavior may be due to a fallacy reminiscent of that arising in the well-known "envelopes problem", in which each of two players holds a sum of money of which she knows nothing about except that it is either half or twice the amount held by the other player. Players may be paradoxically tempted to exchange assets, since an exchange fallaciously appears to always yield an expected value greater than whatever is regarded as the player's present assets. We argue that the fallacy is due to egocentrically framing the problem as if the "amount I have" is definite, albeit unspecified, and shows that framing the paradox acentrically instead eliminates the incentive to exchange assets. A possible psychological source for the human disposition to frame problems in a way that inflates expected gain is discussed. Finally, a heuristic meant to avert the source of the fallacy is proposed. © 2013.

  4. More than one way to be happy: a typology of marital happiness.

    Science.gov (United States)

    Rauer, Amy; Volling, Brenda

    2013-09-01

    This study utilized observational and self-report data from 57 happily married couples to explore assumptions regarding marital happiness. Suggesting that happily married couples are not a homogeneous group, cluster analyses revealed the existence of three types of couples based on their observed behaviors in a problem-solving task: (1) mutually engaged couples (characterized by both spouses' higher negative and positive problem-solving); (2) mutually supportive couples (characterized by both spouses' higher positivity and support); and (3) wife compensation couples (characterized by high wife positivity). Although couples in all three clusters were equally happy with and committed to their marriages, these clusters were differentially associated with spouses' evaluations of their marriage. Spouses in the mutually supportive cluster reported greater intimacy and maintenance and less conflict and ambivalence, although this was more consistently the case in comparison to the wife compensation cluster, as opposed to the mutually engaged cluster. The implications of these typologies are discussed as they pertain to efforts on the part of both practitioners to promote marital happiness and repair marital relations when couples are faced with difficulties. © FPI, Inc.

  5. Approximate method for treating dispersion in one-way quantum channels

    International Nuclear Information System (INIS)

    Stace, T. M.; Wiseman, H. M.

    2006-01-01

    Coupling the output of a source quantum system into a target quantum system is easily treated by cascaded systems theory if the intervening quantum channel is dispersionless. However, dispersion may be important in some transfer protocols, especially in solid-state systems. In this paper we show how to generalize cascaded systems theory to treat such dispersion, provided it is not too strong. We show that the technique also works for fermionic systems with a low flux, and can be extended to treat fermionic systems with large flux. To test our theory, we calculate the effect of dispersion on the fidelity of a simple protocol of quantum state transfer. We find good agreement with an approximate analytical theory that had been previously developed for this example

  6. Complex spatiotemporal behavior in a chain of one-way nonlinearly coupled elements

    DEFF Research Database (Denmark)

    Gaididei, Yuri Borisovich; Berkemer, Rainer; Gorria, C.

    2011-01-01

    the relaxation time is shorter than a critical one a spatially uniform stationary state is stable. In the supercritical regime due to a Hopf bifurcation traveling waves spontaneously create and propagate along the system. Our analytical approach is in good agreement with numerical simulations of the fully...

  7. Residual stresses analysis of friction stir welding using one-way FSI simulation

    International Nuclear Information System (INIS)

    Kang, Sung Wook; Jang, Beom Seon; Song, Ha Cheol

    2015-01-01

    When certain mechanisms, such as plastic deformations and temperature gradients, occur and are released in a structure, stresses remain because of the shape of the structure and external constraints. These stresses are referred to as residual stresses. The base material locally expands during heating in the welding process. When the welding is completed and cooled to room temperature, the residual stresses are left at nearly the yield strength level. In the case of friction stir welding, the maximum temperature is 80% to 90% of the melting point of the materials. Thus, the residual stresses in the welding process are smaller than those in other fusion welding processes; these stresses have not been considered previously. However, friction stir welding residual stresses are sometimes measured at approximately 70% or above. These residual stresses significantly affect fatigue behavior and lifetime. The present study investigates the residual stress distributions in various welding conditions and shapes of friction stir welding. In addition, the asymmetric feature is considered in temperature and residual stress distribution. Heat transfer analysis is conducted using the commercial computational fluid dynamics program Fluent, and results are used in the finite element structural analysis with the ANSYS Multiphysics software. The calculated residual stresses are compared with experimental values using the X-ray diffraction method.

  8. Relationship between thermodynamic driving force and one-way fluxes in reversible processes.

    Directory of Open Access Journals (Sweden)

    Daniel A Beard

    Full Text Available Chemical reaction systems operating in nonequilibrium open-system states arise in a great number of contexts, including the study of living organisms, in which chemical reactions, in general, are far from equilibrium. Here we introduce a theorem that relates forward and reverse fluxes and free energy for any chemical process operating in a steady state. This relationship, which is a generalization of equilibrium conditions to the case of a chemical process occurring in a nonequilibrium steady state in dilute solution, provides a novel equivalent definition for chemical reaction free energy. In addition, it is shown that previously unrelated theories introduced by Ussing and Hodgkin and Huxley for transport of ions across membranes, Hill for catalytic cycle fluxes, and Crooks for entropy production in microscopically reversible systems, are united in a common framework based on this relationship.

  9. One-way data transfer for PLC to VME status reporting at the Advanced Photon Source

    International Nuclear Information System (INIS)

    Stein, S.J.

    1993-01-01

    The Personnel Safety System for the experimental beamlines at the Advanced Photon Source will use a large number of Allen Bradley Programmable Logic Controllers (PLC) to replace conventional relay logic. PLCs allow for the design of a very advanced safety system that can handle a large number of I/O points. Certain situations Require monitoring of the safety system from various locations around the storage ring via EPICS OPI (operator interface)consoles. This presentation covers the method of choice for transferring data from the Personnel Safety System into an EPICS database. Specifics on PLC ladder design, EPICS database design, and hardware selection are also discussed

  10. One way and the other: The bi-directional relationship between ambivalence and body movement

    NARCIS (Netherlands)

    Schneider, I.K.; Eerland, A.; van Harreveld, F.; Rotteveel, M.; van der Pligt, J.; van der Stoep, N.; Zwaan, R.A.

    2013-01-01

    Prior research exploring the relationship between evaluations and body movements has focused on one-sided evaluations. However, people regularly encounter objects or situations about which they simultaneously hold both positive and negative views, which results in the experience of ambivalence. Such

  11. Monitoring Method and Apparatus Using Asynchronous, One-Way Transmission from Sensor to Base Station

    Science.gov (United States)

    Jensen, Scott L. (Inventor); Drouant, George J. (Inventor)

    2013-01-01

    A monitoring system is disclosed, which includes a base station and at least one sensor unit that is separate from the base station. The at least one sensor unit resides in a dormant state until it is awakened by the triggering of a vibration-sensitive switch. Once awakened, the sensor may take a measurement, and then transmit to the base station the measurement. Once data is transmitted from the sensor to the base station, the sensor may return to its dormant state. There may be various sensors for each base station and the various sensors may optionally measure different quantities, such as current, voltage, single-axis and/or three-axis magnetic fields.

  12. 47 CFR 22.589 - One-way or two-way application requirements.

    Science.gov (United States)

    2010-10-01

    ... exceeds 76.4 kilometers (47.5 miles); and identify each protected Basic Exchange Telephone Radio System... applications to operate a transmitter with ERP exceeding the basic power and height-power limits of § 22.565...

  13. 49 CFR 232.403 - Design standards for one-way end-of-train devices.

    Science.gov (United States)

    2010-10-01

    ... measuring the brake pipe pressure on the rear car with an accuracy of ±3 pounds per square inch (psig) and... requirements of the Federal Communications Commission (FCC) and use of a transmission format acceptable to the FCC. (2) If power is supplied by one or more batteries, the operating life shall be a minimum of 36...

  14. Twenty-One Ways to Use Music in Teaching the Language Arts.

    Science.gov (United States)

    Cardarelli, Aldo F.

    Twenty-one activities that integrate music and the language arts in order to capitalize on children's interests are described in this paper. Topics of the activities are as follows: alphabetical order, pantomime, vocabulary building from words of a favorite song, words that are "the most (whatever)" from songs, mood words, a configuration clue…

  15. Group Presentation as One Way of Increasing Students’ Participation in the Classroom

    Directory of Open Access Journals (Sweden)

    Clara Herlina Karjo

    2008-11-01

    Full Text Available Teaching English (TOEFL to a class of 50 students or more is a difficult task for a lecturer. Some problems will occur, for example, the improbability for all students to get equal teacher’s attention and equal chance for learning and studying in class. To overcome these problems, the writer conducts a quasi-experimental research involving 100 students in her two classes in Bina Nusantara University. In this research, the writer applies the group presentation method for teaching TOEFL for one semester. The research shows that group scores are slightly higher than individual students’ scores.Keywords:

  16. Creating and Sharing Annotated Bibliographies: One Way to Become Familiar with Exemplary Multicultural Literature

    Science.gov (United States)

    Richards, Janet C.

    2015-01-01

    Teachers who meet Common Core recommendations about teaching with multicultural literature need to recognize the traditions, values, and customs of various cultures so they can make sound decisions about the authenticity of the books they select for their students. Furthermore, teachers who support students' literacy achievements with exemplary…

  17. One-way quantum computation with four-dimensional photonic qudits

    International Nuclear Information System (INIS)

    Joo, Jaewoo; Knight, Peter L.; O'Brien, Jeremy L.; Rudolph, Terry

    2007-01-01

    We consider the possibility of performing linear optical quantum computations making use of extra photonic degrees of freedom. In particular, we focus on the case where we use photons as quadbits, four-dimensional photonic qudits. The basic 2-quadbit cluster state is a hyperentangled state across polarization and two spatial mode degrees of freedom. We examine the nondeterministic methods whereby such states can be created from single photons and/or Bell pairs and then give some mechanisms for performing higher-dimensional fusion gates

  18. Inter-hospital communications and transport: turning one-way funnels into two-way networks.

    Science.gov (United States)

    Rokos, Ivan C; Sanddal, Nels D; Pancioli, Arthur M; Wolff, Catherine; Gaieski, David F

    2010-12-01

    The Inter-hospital Communications and Transport workgroup was charged with exploring the current status, barriers, and data necessary to optimize the initial destination and subsequent transfer of patients between and among acute care settings. The subtitle, "Turning Funnels Into Two-way Networks," is descriptive of the approach that the workgroup took by exploring how and when smaller facilities in suburban, rural, and frontier areas can contribute to the daily business of caring for emergency patients across the lower-acuity spectrum-in some instances with consultant support from academic medical centers. It also focused on the need to identify high-acuity patients and expedite triage and transfer of those patients to facilities with specialty resources. Draft research recommendations were developed through an iterative writing process and presented to a breakout session of Academic Emergency Medicine's 2010 consensus conference, "Beyond Regionalization: Integrated Networks of Emergency Care." Priority research areas were determined by informal consensus of the breakout group. A subsequent iterative writing process was undertaken to complete this article. A number of broad research questions are presented. 2010 by the Society for Academic Emergency Medicine.

  19. Money market rates and implied CCAPM rates: some international evidence

    OpenAIRE

    Yamin Ahmad

    2004-01-01

    New Neoclassical Synthesis models equate the instrument of monetary policy to the implied CCAPM rate arising from an Euler equation. This paper identifies monetary policy shocks within six of the G7 countries and examines the movement of money market and implied CCAPM rates. The key result is that an increase in the nominal interest rate leads to a fall in the implied CCAPM rate. Incorporating habit still yields the same result. The findings suggest that the movement of these two rates implie...

  20. Key drivers of airline loyalty.

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  1. Key papers in prostate cancer.

    Science.gov (United States)

    Rodney, Simon; Shah, Taimur Tariq; Patel, Hitendra R H; Arya, Manit

    2014-11-01

    Prostate cancer is the most common cancer and second leading cause of death in men. The evidence base for the diagnosis and treatment of prostate cancer is continually changing. We aim to review and discuss past and contemporary papers on these topics to provoke debate and highlight key dilemmas faced by the urological community. We review key papers on prostate-specific antigen screening, radical prostatectomy versus surveillance strategies, targeted therapies, timing of radiotherapy and alternative anti-androgen therapeutics. Previously, the majority of patients, irrespective of risk, underwent radical open surgical procedures associated with considerable morbidity and mortality. Evidence is emerging that not all prostate cancers are alike and that low-grade disease can be safely managed by surveillance strategies and localized treatment to the prostate. The question remains as to how to accurately stage the disease and ultimately choose which treatment pathway to follow.

  2. Key Topics in Sports Medicine

    OpenAIRE

    2006-01-01

    Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1) Sports injuries, rehabilitation and injury prevention, 2) Exercise physiology, fitness testing and training, 3) Drugs in sport, 4) Exercise and health promotion, 5) Sport and exercise for special and clinical populations, 6) The ps...

  3. Key issues for passive safety

    International Nuclear Information System (INIS)

    Hayns, M.R.

    1996-01-01

    The paper represents a summary of the introductory presentation made at this Advisory Group Meeting on the Technical Feasibility and Reliability of Passive Safety Systems. It was intended as an overview of our views on what are the key issues and what are the technical problems which might dominate any future developments of passive safety systems. It is, therefore, not a ''review paper'' as such and only record the highlights. (author)

  4. Human Resources Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Gabčanová Iveta

    2012-03-01

    Full Text Available The article brings out a proposed strategy map and respective key performance indicators (KPIs in human resources (HR. The article provides an overview of how HR activities are supported in order to reach the partial goals of HR as defined in the strategic map. Overall the aim of the paper is to show the possibilities of using the modern Balanced Scorecard method in human capital.

  5. Key issues for passive safety

    Energy Technology Data Exchange (ETDEWEB)

    Hayns, M R [AEA Technology, Harwell, Didcot (United Kingdom). European Institutions; Hicken, E F [Forschungszentrum Juelich GmbH (Germany)

    1996-12-01

    The paper represents a summary of the introductory presentation made at this Advisory Group Meeting on the Technical Feasibility and Reliability of Passive Safety Systems. It was intended as an overview of our views on what are the key issues and what are the technical problems which might dominate any future developments of passive safety systems. It is, therefore, not a ``review paper`` as such and only record the highlights. (author).

  6. Low carbon development. Key issues

    Energy Technology Data Exchange (ETDEWEB)

    Urban, Frauke; Nordensvaard, Johan (eds.)

    2013-03-07

    This comprehensive textbook addresses the interface between international development and climate change in a carbon constrained world. It discusses the key conceptual, empirical and policy-related issues of low carbon development and takes an international and interdisciplinary approach to the subject by drawing on insights from across the natural sciences and social sciences whilst embedding the discussion in a global context. The first part explores the concept of low carbon development and explains the need for low carbon development in a carbon constrained world. The book then discusses the key issues of socio-economic, political and technological nature for low carbon development, exploring topics such as the political economy, social justice, financing and carbon markets, and technologies and innovation for low carbon development. This is followed by key issues for low carbon development in policy and practice, which is presented based on cross-cutting issues such as low carbon energy, forestry, agriculture and transportation. Afterwards, practical case studies are discussed from low carbon development in low income countries in Africa, middle income countries in Asia and Latin America and high income countries in Europe and North America.

  7. Detector decoy quantum key distribution

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2009-01-01

    Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold detector together with a variable attenuator. This idea is similar in spirit to that of the decoy state technique, and is especially suited to those scenarios where only a few parameters of the photon number statistics of the incoming signals have to be estimated. As an illustration of the potential applicability of the method in quantum communication protocols, we use it to prove security of an entanglement-based quantum key distribution scheme with an untrusted source without the need for a squash model and by solely using this extra idea. In this sense, this detector decoy method can be seen as a different conceptual approach to adapt a single-photon security proof to its physical, full optical implementation. We show that in this scenario, the legitimate users can now even discard the double click events from the raw key data without compromising the security of the scheme, and we present simulations on the performance of the BB84 and the 6-state quantum key distribution protocols.

  8. Decomposing the social discount rate

    OpenAIRE

    Scarborough, Helen

    2010-01-01

    Recent modelling of the costs and benefits of climate change has renewed debate surrounding assumptions regarding the social discount rate in analysing the impacts of environmental change. Previous literature segments the social discount rate into being influenced by two key factors; the rate of pure time preference and the elasticity of marginal utility of future consumption. These components of the social discount rate reinforce the linkages between the choice of social discount rate and in...

  9. Key Concepts in Microbial Oceanography

    Science.gov (United States)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  10. Fully Device-Independent Quantum Key Distribution

    Science.gov (United States)

    Vazirani, Umesh; Vidick, Thomas

    2014-10-01

    Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.

  11. Quantum key distribution with entangled photon sources

    International Nuclear Information System (INIS)

    Ma Xiongfeng; Fung, Chi-Hang Fred; Lo, H.-K.

    2007-01-01

    A parametric down-conversion (PDC) source can be used as either a triggered single-photon source or an entangled-photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. We fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis-independent source, we apply Koashi and Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and the Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144-km open-air PDC experiment, we compare three implementations: entanglement PDC QKD, triggering PDC QKD, and coherent-state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent-state QKD. The coherent-state QKD with decoy states is able to achieve highest key rate in the low- and medium-loss regions. By applying the Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70 dB combined channel losses (35 dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53 dB channel losses

  12. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  13. Symmetric autocompensating quantum key distribution

    Science.gov (United States)

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  14. Key energy technologies for Europe

    DEFF Research Database (Denmark)

    Jørgensen, B.H.

    2005-01-01

    This report on key energy technologies is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. Senior Scientist BirteHolst Jørgensen, Risø National Laboratory...... contributed by Scientific Officer Edgar Thielmann, DG TREN, Head of Department Hans Larsen, RisøNational Laboratory, Senior Asset Manager Aksel Hauge Pedersen, DONG VE, Consultant Timon Wehnert, IZT-Berlin, and Senior Scientist Martine Uyterlinde, ECN...

  15. Key concepts in social pedagogy

    DEFF Research Database (Denmark)

    Harbo, Lotte Junker

    2011-01-01

    and activities around key social pedagogical concepts, such as the Common Third, the 3 P’s, the Zone of Proximal Development and the Learning Zone model. In the article we explore how a joint activity, for example playing soccer, can be seen as a pedagogical activity and with what intentions it is undertaken......“Now I can actually play soccer with the young people without fearing that my colleagues think I am escaping the paper work.” These were the words from a participant in a social pedagogy training course in England a few years ago. This understanding emerged through in-depth discussions...

  16. Public/private key certification authority and key distribution. Draft

    Energy Technology Data Exchange (ETDEWEB)

    Long, J.P.; Christensen, M.J.; Sturtevant, A.P.; Johnston, W.E.

    1995-09-25

    Traditional encryption, which protects messages from prying eyes, has been used for many decades. The present concepts of encryption are built from that heritage. Utilization of modern software-based encryption techniques implies much more than simply converting files to an unreadable form. Ubiquitous use of computers and advances in encryption technology coupled with the use of wide-area networking completely changed the reasons for utilizing encryption technology. The technology demands a new and extensive infrastructure to support these functions. Full understanding of these functions, their utility and value, and the need for an infrastructure, takes extensive exposure to the new paradigm. This paper addresses issues surrounding the establishment and operation of a key management system (i.e., certification authority) that is essential to the successful implementation and wide-spread use of encryption.

  17. Three key affordances for serendipity

    DEFF Research Database (Denmark)

    Björneborn, Lennart

    2017-01-01

    Purpose Serendipity is an interesting phenomenon to study in information science as it plays a fundamental – but perhaps underestimated – role in how we discover, explore, and learn in all fields of life. The purpose of this paper is to operationalize the concept of serendipity by providing termi...... terminological “building blocks” for understanding connections between environmental and personal factors in serendipitous encounters. Understanding these connections is essential when designing affordances in physical and digital environments that can facilitate serendipity. Design....../methodology/approach In this paper, serendipity is defined as what happens when we, in unplanned ways, encounter resources (information, things, people, etc.) that we find interesting. In the outlined framework, serendipity is understood as an affordance, i.e., a usage potential when environmental and personal factors correspond...... the three key affordances and three key personal serendipity factors: curiosity, mobility, and sensitivity. Ten sub-affordances for serendipity and ten coupled personal sub-factors are also briefly outlined. Related research is compared with and mapped into the framework aiming at a theoretical validation...

  18. Key energy technologies for Europe

    International Nuclear Information System (INIS)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO 2 capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  19. Entangled quantum key distribution with a biased basis choice

    International Nuclear Information System (INIS)

    Erven, Chris; Ma Xiongfeng; Laflamme, Raymond; Weihs, Gregor

    2009-01-01

    We investigate a quantum key distribution (QKD) scheme that utilizes a biased basis choice in order to increase the efficiency of the scheme. The optimal bias between the two measurement bases, a more refined error analysis and finite key size effects are all studied in order to assure the security of the final key generated with the system. We then implement the scheme in a local entangled QKD system that uses polarization entangled photon pairs to securely distribute the key. A 50/50 non-polarizing beamsplitter (BS) with different optical attenuators is used to simulate a variable BS in order to allow us to study the operation of the system for different biases. Over 6 h of continuous operation with a total bias of 0.9837/0.0163 (Z/X), we were able to generate 0.4567 secure key bits per raw key bit as compared to 0.2550 secure key bits per raw key bit for the unbiased case. This represents an increase in the efficiency of the key generation rate by 79%.

  20. Experimental aspects of deterministic secure quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Walenta, Nino; Korn, Dietmar; Puhlmann, Dirk; Felbinger, Timo; Hoffmann, Holger; Ostermeyer, Martin [Universitaet Potsdam (Germany). Institut fuer Physik; Bostroem, Kim [Universitaet Muenster (Germany)

    2008-07-01

    Most common protocols for quantum key distribution (QKD) use non-deterministic algorithms to establish a shared key. But deterministic implementations can allow for higher net key transfer rates and eavesdropping detection rates. The Ping-Pong coding scheme by Bostroem and Felbinger[1] employs deterministic information encoding in entangled states with its characteristic quantum channel from Bob to Alice and back to Bob. Based on a table-top implementation of this protocol with polarization-entangled photons fundamental advantages as well as practical issues like transmission losses, photon storage and requirements for progress towards longer transmission distances are discussed and compared to non-deterministic protocols. Modifications of common protocols towards a deterministic quantum key distribution are addressed.

  1. Key Lake human resources and northern business initiative

    International Nuclear Information System (INIS)

    Dudar, R.; McIntyre, J.; McInnes, B.P.

    1994-01-01

    The Key Lake Operation is committed to a policy of maximizing Saskatchewan, and particularly northern Saskatchewan, employment and business opportunities. The participation rate of northern people in the Key Lake operation's workforce has risen from 23.8% in 1983, to 42% today. Cameco's objective is to achieve 50% representation of residents of Saskatchewan's north in the Key Lake workforce by 1995. The company also extends this strategic objective to contractors. All contractors are required to maximize employment opportunities for residents of Saskatchewan's north, and report employment levels to the company as a condition of the contract. Today, contractors at the Key Lake site have achieved a northern participation rate of 47%. This paper highlights strategies for increasing northern/aboriginal participation and provides several examples of successes from these initiatives. (author)

  2. Key Technologies in Massive MIMO

    Directory of Open Access Journals (Sweden)

    Hu Qiang

    2018-01-01

    Full Text Available The explosive growth of wireless data traffic in the future fifth generation mobile communication system (5G has led researchers to develop new disruptive technologies. As an extension of traditional MIMO technology, massive MIMO can greatly improve the throughput rate and energy efficiency, and can effectively improve the link reliability and data transmission rate, which is an important research direction of 5G wireless communication. Massive MIMO technology is nearly three years to get a new technology of rapid development and it through a lot of increasing the number of antenna communication, using very duplex communication mode, make the system spectrum efficiency to an unprecedented height.

  3. Unconditional security of quantum key distribution and the uncertainty principle

    International Nuclear Information System (INIS)

    Koashi, Masato

    2006-01-01

    An approach to the unconditional security of quantum key distribution protocols is presented, which is based on the uncertainty principle. The approach applies to every case that has been treated via the argument by Shor and Preskill, but it is not necessary to find quantum error correcting codes. It can also treat the cases with uncharacterized apparatuses. The proof can be applied to cases where the secret key rate is larger than the distillable entanglement

  4. Key to Language Learning Success

    Directory of Open Access Journals (Sweden)

    Oktavian Mantiri

    2015-01-01

    Full Text Available This paper looks at the important elements of language learning and teaching i.e. the role of teachers as well as the attitude and motivation of learners. Teachers undoubtedly play crucial roles in students’ language learning outcome which could ignite or diminish students’ motivation. Positive attitudes and motivation – instrumental or integrative and intrinsic or extrinsic – are key to successful learning. Therefore it is paramount for language teachers as well as learners to know these roles and nurture the best possible ways where language teaching and learning will thrive. This paper also suggested that both stake-holders should be open to holistic approach of language learning and that other factors such as the environment could play an important part in language teaching and learning success.

  5. Cogeneration: Key feasibility analysis parameters

    International Nuclear Information System (INIS)

    Coslovi, S.; Zulian, A.

    1992-01-01

    This paper first reviews the essential requirements, in terms of scope, objectives and methods, of technical/economic feasibility analyses applied to cogeneration systems proposed for industrial plants in Italy. Attention is given to the influence on overall feasibility of the following factors: electric power and fuel costs, equipment coefficients of performance, operating schedules, maintenance costs, Italian Government taxes and financial and legal incentives. Through an examination of several feasibility studies that were done on cogeneration proposals relative to different industrial sectors, a sensitivity analysis is performed on the effects of varying the weights of different cost benefit analysis parameters. With the use of statistical analyses, standard deviations are then determined for key analysis parameters, and guidelines are suggested for analysis simplifications

  6. Fibre optic communication key devices

    CERN Document Server

    Grote, Norbert

    2017-01-01

    The book gives an in-depth description of key devices of current and next generation fibre optic communication networks. Devices treated include semiconductor lasers, optical amplifiers, modulators, wavelength filters and other passives, detectors, all-optical switches, but relevant properties of optical fibres and network aspects are included as well. The presentations include the physical principles underlying the various devices, technologies used for their realization, typical performance characteristics and limitations, but development trends towards more advanced components are also illustrated. This new edition of a successful book was expanded and updated extensively. The new edition covers among others lasers for optical communication, optical switches, hybrid integration, monolithic integration and silicon photonics. The main focus is on Indium phosphide-based structures but silicon photonics is included as well. The book covers relevant principles, state-of-the-art implementations, status of curren...

  7. Key energy technologies for Europe

    Energy Technology Data Exchange (ETDEWEB)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO{sub 2} capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  8. One Step Quantum Key Distribution Based on EPR Entanglement.

    Science.gov (United States)

    Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao

    2016-06-30

    A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper's attack would introduce at least an error rate of 46.875%. Compared with the "Ping-pong" protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step.

  9. Iris recognition based on key image feature extraction.

    Science.gov (United States)

    Ren, X; Tian, Q; Zhang, J; Wu, S; Zeng, Y

    2008-01-01

    In iris recognition, feature extraction can be influenced by factors such as illumination and contrast, and thus the features extracted may be unreliable, which can cause a high rate of false results in iris pattern recognition. In order to obtain stable features, an algorithm was proposed in this paper to extract key features of a pattern from multiple images. The proposed algorithm built an iris feature template by extracting key features and performed iris identity enrolment. Simulation results showed that the selected key features have high recognition accuracy on the CASIA Iris Set, where both contrast and illumination variance exist.

  10. Key performance indicators in an acute surgical unit: have we made an impact?

    Science.gov (United States)

    Hsee, Li; Devaud, Marcelo; Civil, Ian

    2012-10-01

    Timely access to acute surgery is a worldwide issue and New Zealand is similarly affected. Auckland City Hospital is one of the largest metropolitan public hospitals in New Zealand where more than 60 % of surgical admissions fit into the acute category. In January 2009, an Acute Surgical Unit (ASU) was set up to improve acute surgical flow. Key performance indicators (KPIs) were identified as valuable tools in evaluating ASU service performance. Our goals were to describe the current acute patient pathway, present the early trend of KPIs for the ASU and determine whether an impact has been made on acute surgical patients. A retrospective review of patients admitted with acute general surgical conditions from January 2008 (pre-ASU) to October 2010 was performed. Patient data were identified through hospital electronic records. KPIs assessed included: (1) time to assess referred patients from the emergency department (ED) and from GPs [where patient assessment occurs in the assessment and planning unit (APU)]; (2) preoperative length of stay (LOS[PO]); (3) length of stay of nonadmitted patients (LOS[NA]); (4) case volume "in h" (0730-1730) versus "after h"; and (5) readmission rate. Statistical analysis was performed with one-way ANOVA, regression, and χ(2) tests. Results show a reduction of mean time from referral to assessment from 2.28 to 1.6 h in the ED (p ≤ 0.001). Patients are seen in APU after GP referral sooner as well as the time from referral to assessment reducing from 2 to 1.76 h (p < 0.001). The LOS[PO] has not changed significantly overall (34.58 vs. 34.88 h, p = not significant [NS]). However, there are encouraging signs in high-volume procedures, such as appendicectomy. The mean LOS[PO] for appendicectomy was 7.81 h but is now 6.53 h (p ≤ 0.005). The LOS[NA] has decreased from 15.23 to 9.48 h (p < 0.005). Since the development of the ASU, the number of cases operated on "in hours" is increasing with a corresponding decrease in "after hours

  11. The Confusion of Content Marketing : a study to clarify the key dimensions of content marketing

    OpenAIRE

    Claesson, Amanda; Jonsson, Albin

    2017-01-01

    Content marketing is a popular marketing strategy, which has increased significantly during the last years. The term content marketing is new but companies have been working with parts of the strategy for decades. The new digital era changed the communication from a one-way to a two-way communica- tion. Customers now have a demand for relevant content that is valuable for them. The purpose of this dissertation is to develop an understanding of this marketing strategy, and clarify the key dime...

  12. Key attributes of expert NRL referees.

    Science.gov (United States)

    Morris, Gavin; O'Connor, Donna

    2017-05-01

    Experiential knowledge of elite National Rugby League (NRL) referees was investigated to determine the key attributes contributing to expert officiating performance. Fourteen current first-grade NRL referees were asked to identify the key attributes they believed contributed to their expert refereeing performance. The modified Delphi method involved a 3-round process of an initial semi-structured interview followed by 2 questionnaires to reach consensus of opinion. The data revealed 25 attributes that were rated as most important that underpin expert NRL refereeing performance. Results illustrate the significance of the cognitive category, with the top 6 ranked attributes all cognitive skills. Of these, the referees ranked decision-making accuracy as the most important attribute, followed by reading the game, communication, game understanding, game management and knowledge of the rules. Player rapport, positioning and teamwork were the top ranked game skill attributes underpinning performance excellence. Expert referees also highlighted a number of psychological attributes (e.g., concentration, composure and mental toughness) that were significant to performance. There were only 2 physiological attributes (fitness, aerobic endurance) that were identified as significant to elite officiating performance. In summary, expert consensus was attained which successfully provided a hierarchy of the most significant attributes of expert NRL refereeing performance.

  13. Calculating second derivatives of population growth rates for ecology and evolution

    NARCIS (Netherlands)

    Shyu, E.; Caswell, H.

    2014-01-01

    Second derivatives of the population growth rate measure the curvature of its response to demographic, physiological or environmental parameters. The second derivatives quantify the response of sensitivity results to perturbations, provide a classification of types of selection and provide one way

  14. Geological influence on terrestrial gamma radiation dose rate in the Malaysian State of Johore

    International Nuclear Information System (INIS)

    Ramli, A.T.; Hussein, A.W.M.A.; Lee, M.H.

    2001-01-01

    Measurements of environmental terrestrial gamma radiation dose-rate (TGRD) have been made in Johore, Malaysia. The focus is on determining a relationship between geological type and TGRD levels. Data were compared using the one way analysis of variance (ANOVA), in some instances revealing significant differences between TGRD measurements and the underlying geological structure

  15. Securing quantum key distribution systems using fewer states

    Science.gov (United States)

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.

    2018-04-01

    Quantum key distribution (QKD) allows two remote users to establish a secret key in the presence of an eavesdropper. The users share quantum states prepared in two mutually unbiased bases: one to generate the key while the other monitors the presence of the eavesdropper. Here, we show that a general d -dimension QKD system can be secured by transmitting only a subset of the monitoring states. In particular, we find that there is no loss in the secure key rate when dropping one of the monitoring states. Furthermore, it is possible to use only a single monitoring state if the quantum bit error rates are low enough. We apply our formalism to an experimental d =4 time-phase QKD system, where only one monitoring state is transmitted, and obtain a secret key rate of 17.4 ±2.8 Mbits/s at a 4 dB channel loss and with a quantum bit error rate of 0.045 ±0.001 and 0.037 ±0.001 in time and phase bases, respectively, which is 58.4% of the secret key rate that can be achieved with the full setup. This ratio can be increased, potentially up to 100%, if the error rates in time and phase basis are reduced. Our results demonstrate that it is possible to substantially simplify the design of high-dimensional QKD systems, including those that use the spatial or temporal degrees of freedom of the photon, and still outperform qubit-based (d =2 ) protocols.

  16. 25 CFR 502.14 - Key employee.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Key employee. 502.14 Section 502.14 Indians NATIONAL....14 Key employee. Key employee means: (a) A person who performs one or more of the following functions... gaming operation. (d) Any other person designated by the tribe as a key employee. [57 FR 12392, Apr. 9...

  17. VICKEY: Mining Conditional Keys on Knowledge Bases

    DEFF Research Database (Denmark)

    Symeonidou, Danai; Prado, Luis Antonio Galarraga Del; Pernelle, Nathalie

    2017-01-01

    A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs...

  18. Calculation of key reduction for B92 QKD protocol

    Science.gov (United States)

    Mehic, Miralem; Partila, Pavol; Tovarek, Jaromir; Voznak, Miroslav

    2015-05-01

    It is well known that Quantum Key Distribution (QKD) can be used with the highest level of security for distribution of the secret key, which is further used for symmetrical encryption. B92 is one of the oldest QKD protocols. It uses only two non-orthogonal states, each one coding for one bit-value. It is much faster and simpler when compared to its predecessors, but with the idealized maximum efficiencies of 25% over the quantum channel. B92 consists of several phases in which initial key is significantly reduced: secret key exchange, extraction of the raw key (sifting), error rate estimation, key reconciliation and privacy amplification. QKD communication is performed over two channels: the quantum channel and the classical public channel. In order to prevent a man-in-the-middle attack and modification of messages on the public channel, authentication of exchanged values must be performed. We used Wegman-Carter authentication because it describes an upper bound for needed symmetric authentication key. We explained the reduction of the initial key in each of QKD phases.

  19. A key design to prolong lifetime of wireless sensor network

    International Nuclear Information System (INIS)

    Qiu, Bo; Chen, XiQiu; Wu, Qi

    2016-01-01

    In order to solve the contradiction between the connectivity of the wireless sensor network and the key storage consumption, under the premise of reducing network storage consumption, the key pre-distribution management scheme with higher connectivity rate is proposed using the hexagonal network deployment information, which adopts the idea of the matrix space for the square deployment information strategy to reduce the burden of the network storage. Ability against the capture attack is improved obviously. The results show that contradiction between the network connectivity rate and the energy consumption has a better solution, and the proposed algorithm is suitable for the wireless sensor networks of energy limited.

  20. Quantum key distribution and cryptography

    International Nuclear Information System (INIS)

    Alleaume, R.

    2005-01-01

    Full text: Originally proposed by classical cryptographers, the ideas behind Quantum Key Distribution (QKD) have attracted considerable interest among the quantum optics community, which has significantly helped bring these ideas to reality. Experimental realizations have quickly evolved from early lab demonstrations to QKD systems that are now deployed in real conditions and targeting commercial applications. Although QKD can be theoretically proven to rely on 'unconditional security proofs' and should thus be able to provide security levels unachievable through computationally-based cryptographic techniques, the debate on the cryptographic applications of QKD remains somehow controversial. It seems that a consensus on that matter cannot be reached without a careful analysis of assumptions and definitions related to security models used in classical or in quantum cryptography. In this talk, we will try to present a comprehensive synthesis on this topic. We have initiated this work as a contribution to the European IP SECOQC project, confronting views and knowledge among experimental and theoretical quantum physicists, as well as classical cryptographers. (author)

  1. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    Science.gov (United States)

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  2. Ratings Revisited

    DEFF Research Database (Denmark)

    Lai, Signe Sophus

    2015-01-01

    tværs af medier og platforme, forskudt i tid og on-demand. This article focuses on audience ratings, which have functioned as the central ‘currency’ informing the media trade. It discusses changes to the production and accuracy of audience ratings at a time when established standards are being...

  3. Two-dimensional quantum key distribution (QKD) protocol for increased key rate fiber-based quantum communications

    DEFF Research Database (Denmark)

    da Lio, Beatrice; Bacco, Davide; Ding, Yunhong

    2017-01-01

    We experimentally prove a novel two-dimensional QKD scheme, relying on differential phasetime shifting (DPTS) of strongly attenuated weak coherent pulses. We demonstrate QKD transmission up to 170 km standard fiber, and even include a classical channel up to 90 km.......We experimentally prove a novel two-dimensional QKD scheme, relying on differential phasetime shifting (DPTS) of strongly attenuated weak coherent pulses. We demonstrate QKD transmission up to 170 km standard fiber, and even include a classical channel up to 90 km....

  4. Introduction strategies raise key questions.

    Science.gov (United States)

    Finger, W R; Keller, S

    1995-09-01

    Key issues that must be considered before a new contraceptive is introduced center on the need for a trained provider to begin or terminate the method, its side effects, duration of use, method's ability to meet users' needs and preferences, and extra training or staff requirements. Logistics and economic issues to consider are identifying a dependable way of effectively supplying commodities, planning extra services needed for the method, and cost of providing the method. Each contraceptive method presents a different side effect pattern and burdens the service delivery setting differently. The strategy developed to introduce or expand the 3-month injectable Depo-Provera (DMPA) can be used for any method. It includes a needs assessment and addresses regulatory issues, service delivery policies and procedures, information and training, evaluation, and other concerns. Viet Nam's needs assessment showed that Norplant should not be introduced until the service delivery system becomes stronger. Any needs assessment for expansion of contraceptive services should cover sexually transmitted disease/HIV issues. A World Health Organization strategy helps officials identify the best method mix for local situations. Introductory strategies must aim to improve the quality of family planning programs and expand choices. Many begin by examining existing data and conducting interviews with policymakers, users, providers, and women's health advocates. Introductory programs for Norplant focus on provider training, adequate counseling and informed consent for users, and ready access to removal. They need a well-prepared service delivery infrastructure. The first phase of the DMPA introductory strategy for the Philippines comprised a social marketing campaign and DMPA introduction at public clinics in 10 pilot areas with strong service delivery. Successful AIDS prevention programs show that people tend to use barrier methods when they are available. USAID is currently studying

  5. Key issues in transplant tourism.

    Science.gov (United States)

    Akoh, Jacob A

    2012-02-24

    Access to organ transplantation depends on national circumstances, and is partly determined by the cost of health care, availability of transplant services, the level of technical capacity and the availability of organs. Commercial transplantation is estimated to account for 5%-10% (3500-7000) of kidney transplants performed annually throughout the world. This review is to determine the state and outcome of renal transplantation associated with transplant tourism (TT) and the key challenges with such transplantation. The stakeholders of commercial transplantation include: patients on the waiting lists in developed countries or not on any list in developing countries; dialysis funding bodies; middlemen, hosting transplant centres; organ-exporting countries; and organ vendors. TT and commercial kidney transplants are associated with a high incidence of surgical complications, acute rejection and invasive infection which cause major morbidity and mortality. There are ethical and medical concerns regarding the management of recipients of organs from vendors. The growing demand for transplantation, the perceived failure of altruistic donation in providing enough organs has led to calls for a legalised market in organ procurement or regulated trial in incentives for donation. Developing transplant services worldwide has many benefits - improving results of transplantation as they would be performed legally, increasing the donor pool and making TT unnecessary. Meanwhile there is a need to re-examine intrinsic attitudes to TT bearing in mind the cultural and economic realities of globalisation. Perhaps the World Health Organization in conjunction with The Transplantation Society would set up a working party of stakeholders to study this matter in greater detail and make recommendations.

  6. Efficient User Authentication and Key Management for Peer-to-Peer Live Streaming Systems

    Institute of Scientific and Technical Information of China (English)

    LIU Xuening; YIN Hao; LIN Chuang; DU Changlai

    2009-01-01

    Recent development of the peer-to-peer (P2P) live streaming technique has brought unprece-dented new momentum to the Internet with the characters of effective, scalable, and low cost. However, be-fore these applications can be successfully deployed as commercial applications, efficient access control mechanisms are needed. This work based on earlier research of the secure streaming architecture in Trust-Stream, analyzes how to ensure that only authorized users can access the original media in the P2P live streaming system by adopting a user authentication and key management scheme. The major features of this system include (1) the management server issues each authorized user a unique public key certificate,(2) the one-way hash chain extends the certificate's lifetime, (3) the original media is encrypted by the ses-sion key and delivered to the communication group, and (4) the session key is periodically updated and dis-tributed with the media. Finally, analyses and test results show that scheme provides a secure, scalable, re-liable, and efficient access control solution for P2P live streaming systems.

  7. Oxidative stress: a key regulator of leiomyoma cell survival.

    Science.gov (United States)

    Fletcher, Nicole M; Abusamaan, Mohammed S; Memaj, Ira; Saed, Mohammed G; Al-Hendy, Ayman; Diamond, Michael P; Saed, Ghassan M

    2017-06-01

    To determine the effects of attenuating oxidative stress with the use of dichloroacetate (DCA) on the expression of key redox enzymes myeloperoxidase (MPO) and inducible nitric oxide synthase (iNOS) as well as on apoptosis. Prospective experimental study. University medical center. Cells established from myometrium and uterine fibroid from the same patients. Cells were exposed to normal (20% O 2 ) or hypoxic (2% O 2 ) conditions for 24 hours with or without DCA (20 μg/mL), a metabolic modulator that shifts anaerobic to aerobic metabolism. Nitrate/nitrite (iNOS activity indicator), iNOS, Bcl-2/Bax ratio, MPO, and caspase-3 activities and levels were determined by means of Greiss assay, real-time reverse-transcription polymerase chain reaction, and ELISA. Data were analyzed with the use of SPSS by means of one-way analysis of variance with Tukey post hoc analysis and independent t tests. MPO, iNOS, and nitrate/nitrite expression were higher in leiomyoma than in myometrial cells, and they were further enhanced by hypoxia in myometrial cells. Treatment with the use of DCA decreased MPO, iNOS, and nitrate/nitrite levels and negated the effect of hypoxia in both types of cells. Leiomyoma cells showed less apoptosis, as indicated by both caspase-3 activity and the Bcl-2/Bax ratio, than myometrial cells. Hypoxia further decreased apoptosis in myometrial cells with no further effect on leiomyoma cells. Treatment with DCA resulted in increased apoptosis in both types of cells, even in the presence of hypoxia. Shifting anaerobic to aerobic metabolism with the use of DCA resulted in an increase in apoptosis in leiomyoma cells and protected myometrial cells from the acquisition of the leiomyoma-like phenotype. Copyright © 2017 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  8. Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

    Directory of Open Access Journals (Sweden)

    Tieyu Zhao

    2015-01-01

    Full Text Available The optical image encryption has attracted more and more researchers’ attention, and the various encryption schemes have been proposed. In existing optical cryptosystem, the phase functions or images are usually used as the encryption keys, and it is difficult that the traditional public-key algorithm (such as RSA, ECC, etc. is used to complete large numerical key transfer. In this paper, we propose a key distribution scheme based on the phase retrieval algorithm and the RSA public-key algorithm, which solves the problem for the key distribution in optical image encryption system. Furthermore, we also propose a novel image encryption system based on the key distribution principle. In the system, the different keys can be used in every encryption process, which greatly improves the security of the system.

  9. The determinants of exchange rate in Croatia

    Directory of Open Access Journals (Sweden)

    Manuel BENAZIC

    2016-06-01

    Full Text Available The dilemma for every country with an independent monetary policy is which kind of exchange rate arrangement should be applied. Through the exchange rate policy, countries can influence their economies, i.e. price stability and export competiveness. Croatia is a new EU member state, it has its own monetary policy and currency but it is on the way to euro introduction. Regarding the experiences from the beginning of the 1990s when Croatia was faced with serious monetary instabilities and hyperinflation, the goal of Croatian National Bank (CNB is to ensure price stability and one way to do so is through exchange rate policy. Croatia, as a small and open economy, has applied a managed floating exchange rate regime. The exchange rate is determined primarily by the foreign exchange supply and demand on the foreign exchange market, with occasional market interventions by the CNB. Therefore, in order to maintain exchange rate stability, policymakers must be able to recognize how changes in these factors affect changes in the exchange rate. This research aims to find a relationship among the main sources of foreign currency inflow and outflow and the level of exchange rate in Croatia. The analysis is carried out by using the bounds testing (ARDL approach for co-integration. The results indicate the existence of a stable co-integration relationship between the observed variables, whereby an increase in the majority of variables leads to an exchange rate appreciation.

  10. Tomographic Approach in Three-Orthogonal-Basis Quantum Key Distribution

    International Nuclear Information System (INIS)

    Liang Wen-Ye; Yin Zhen-Qiang; Chen Hua; Li Hong-Wei; Chen Wei; Han Zheng-Fu; Wen Hao

    2015-01-01

    At present, there is an increasing awareness of some three-orthogonal-basis quantum key distribution protocols, such as, the reference-frame-independent (RFI) protocol and the six-state protocol. For secure key rate estimations of these protocols, there are two methods: one is the conventional approach, and another is the tomographic approach. However, a comparison between these two methods has not been given yet. In this work, with the general model of rotation channel, we estimate the key rate using conventional and tomographic methods respectively. Results show that conventional estimation approach in RFI protocol is equivalent to tomographic approach only in the case of that one of three orthogonal bases is always aligned. In other cases, tomographic approach performs much better than the respective conventional approaches of the RFI protocol and the six-state protocol. Furthermore, based on the experimental data, we illustrate the deep connections between tomography and conventional RFI approach representations. (paper)

  11. Long-distance quantum key distribution with imperfect devices

    International Nuclear Information System (INIS)

    Lo Piparo, Nicoló; Razavi, Mohsen

    2014-01-01

    Quantum key distribution over probabilistic quantum repeaters is addressed. We compare, under practical assumptions, two such schemes in terms of their secure key generation rate per memory, R QKD . The two schemes under investigation are the one proposed by Duan et al. in [Nat. 414, 413 (2001)] and that of Sangouard et al. proposed in [Phys. Rev. A 76, 050301 (2007)]. We consider various sources of imperfections in the latter protocol, such as a nonzero double-photon probability for the source, dark count per pulse, channel loss and inefficiencies in photodetectors and memories, to find the rate for different nesting levels. We determine the maximum value of the double-photon probability beyond which it is not possible to share a secret key anymore. We find the crossover distance for up to three nesting levels. We finally compare the two protocols

  12. Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths

    International Nuclear Information System (INIS)

    Hayashi, Masahito; Nakayama, Ryota

    2014-01-01

    This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett–Brassard 1984 protocol for finite key lengths, when we employ the decoy method. Using the formula, we can guarantee the security parameter for a realizable quantum key distribution system. The key generation rates with finite key lengths are numerically evaluated. The proposed method improves the existing key generation rate even in the asymptotic setting. (paper)

  13. The influence of sovereign credit ratings on corporate credit ratings.

    OpenAIRE

    Umutoni, Liliane

    2017-01-01

    Credit ratings have a key role in modern financial markets as they communicate crucial information on the creditworthiness of a debt issuer to investors and regulators. These credit ratings are mostly determined by three rating agencies, namely Standard & Poor’s, Moody’s and Fitch, even though, the credit rating industry counts a dozen of recognized rating agencies. Indeed, the three agencies have become the market leaders with a market share of 94.3% on the U.S market (Bloomberg, 2015) and 9...

  14. Two-way quantum key distribution at telecommunication wavelength

    International Nuclear Information System (INIS)

    Kumar, Rupesh; Lucamarini, Marco; Di Giuseppe, Giovanni; Natali, Riccardo; Mancini, Giorgio; Tombesi, Paolo

    2008-01-01

    We report on a quantum key distribution effected with a two-way deterministic protocol over a standard telecommunication fiber. Despite the common belief of a prohibitive loss rate for such a scheme, our results show its feasibility on distances of few tenths of kilometers

  15. Photon nonlinear mixing in subcarrier multiplexed quantum key distribution systems.

    Science.gov (United States)

    Capmany, José

    2009-04-13

    We provide, for the first time to our knowledge, an analysis of the influence of nonlinear photon mixing on the end to end quantum bit error rate (QBER) performance of subcarrier multiplexed quantum key distribution systems. The results show that negligible impact is to be expected for modulation indexes in the range of 2%.

  16. Capacity of a dual enrollment system with two keys based on an SRAM-PUF

    NARCIS (Netherlands)

    Kusters, L.; Willems, F.M.J.

    2018-01-01

    We investigate the capacity of an SRAM-PUF based secrecy system that produces two secret keys during two consecutive enrollments. We determined the region of secret-key rates that are achievable and show that the total secret-key capacity is larger than for a single enrollment system. In our

  17. Laparoscopic radical cystectomy: key points

    Directory of Open Access Journals (Sweden)

    D. V. Perlin

    2018-01-01

    Full Text Available Background. Radical cystectomy remains the golden standard for treatment of muscle invasive bladder cancer. Objective: to duplicate with highest accuracy the open radical cystectomy procedure, which we successfully utilized earlier in our clinic, in the of laparoscopic conditions in order to preserve the advantages of minimally invasive procedures and retain the reliability of the tried and tested open surgery.Materials and methods. In the report were included 35 patients (27 men and 8 women with bladder cancer, who underwent laparoscopic radical cystectomy in Volgograd Regional Center of Urology and Nephrology between April 2013 and March 2016. Only the patients who had been submitted to full intracorporal ileal conduits were included.Results. The mean operative time was 378 minutes, the mean blood loss was 285 millilitres, the mean length of hospital stay was 12.4 days, only 20 % of patients required the narcotic anesthetics. The postoperative complication rate was 11.4 %. However, the majority of the patients were successfully treated with minimally invasive procedures. Generally, our results were similar to other reported studies.Conclusion. Laparoscopic radical cystectomy is a safe and efficient modality of treatment of bladder cancer. However, it needs more procedures and longer observation period to establish laparoscopic radical cystectomy as an alternative to open radical cystectomy.

  18. Quantum key distribution network for multiple applications

    Science.gov (United States)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  19. Electronic Nicotine Delivery Systems Key Facts Infographic

    Data.gov (United States)

    U.S. Department of Health & Human Services — Explore the Electronic Nicotine Delivery Systems Key Facts Infographic which outlines key facts related to electronic nicotine delivery systems (ENDS), including...

  20. Quantum key distribution via quantum encryption

    CERN Document Server

    Yong Sheng Zhang; Guang Can Guo

    2001-01-01

    A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key. The quantum key is reusable and the eavesdropper cannot elicit any information from the particle Alice sends to Bob. The concept of quantum encryption is also discussed. (21 refs).

  1. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    OpenAIRE

    Magdalena Daniela DINU

    2014-01-01

    This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of bot...

  2. Key features of wave energy.

    Science.gov (United States)

    Rainey, R C T

    2012-01-28

    For a weak point source or dipole, or a small body operating as either, we show that the power from a wave energy converter (WEC) is the product of the particle velocity in the waves, and the wave force (suitably defined). There is a thus a strong analogy with a wind or tidal turbine, where the power is the product of the fluid velocity through the turbine, and the force on it. As a first approximation, the cost of a structure is controlled by the force it has to carry, which governs its strength, and the distance it has to be carried, which governs its size. Thus, WECs are at a disadvantage compared with wind and tidal turbines because the fluid velocities are lower, and hence the forces are higher. On the other hand, the distances involved are lower. As with turbines, the implication is also that a WEC must make the most of its force-carrying ability-ideally, to carry its maximum force all the time, the '100% sweating WEC'. It must be able to limit the wave force on it in larger waves, ultimately becoming near-transparent to them in the survival condition-just like a turbine in extreme conditions, which can stop and feather its blades. A turbine of any force rating can achieve its maximum force in low wind speeds, if its diameter is sufficiently large. This is not possible with a simple monopole or dipole WEC, however, because of the 'nλ/2π' capture width limits. To achieve reasonable 'sweating' in typical wave climates, the force is limited to about 1 MN for a monopole device, or 2 MN for a dipole. The conclusion is that the future of wave energy is in devices that are not simple monopoles or dipoles, but multi-body devices or other shapes equivalent to arrays.

  3. Improved Anonymity for Key-trees

    NARCIS (Netherlands)

    Veugen, P.J.M.; Beye, M.

    2013-01-01

    Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags.

  4. Harry Potter and the Dichotomous Key

    Science.gov (United States)

    Crowther, David T.

    2003-01-01

    In this lesson, students use Bertie Bott's Every Flavor Beans--a "wild" candy written about in the Harry Potter books and now available in stores--to learn about classification and dichotomous keys. In these activities, students sort jelly beans according to a key and then construct a key for a "new" flavor of beans. Students then build on their…

  5. Key Success Factors in E-Learning in Medical Education

    Directory of Open Access Journals (Sweden)

    Hassan Emami

    2009-08-01

    Full Text Available Background and purpose: As in many countries, Medical Education (ME is offered in three levels including Undergraduate ME, Graduate ME, and Continuing ME. Informtion tehnology development has provided a suitable chance for ME. E-learning in ME is growing more and more. The present study seeks to determine the key success factors (KSF in E-learning in medical fields.Methods: KSF has been scrutinized in the literature following of which, and due to similarity, a classification with seven groupings was established including institutional factor, technology, interested parties, information knowledge, methods and approaches educational resources, and environmental factors. Through a questionnaire, the data were gatered from the information technology (IT directors in all medical universities throughout the country. The data collected were subjected to factorial analysis. Data from heads of educational groups were obtained through focus group discussion. Cronbach reliability coefficient was calculated for questionnaire used. Factorial analysis was used to identify meaningful KSF. T-Test, and one-way variance analysis as well as Pearson’s correlation were used. The analysis was conducted with SPSS softwareResults: The results showed no significant differences between age, sex, career, and level of education, and KSF. The preparedness factors were analyzed through group discussions with the heads of the academic departments under the study. By factorial analyses, five factors were found including the departmental interest and potential (27.3%, task performance potential (25.1%, E-teaching development in basic and clinical sciences , and continuing education (20.1%, suitable cultural environment (16.8%, and infrastructures (10.8%. Fisher Exeact Test was used to compare the obtained ratios in 5% curve whose results showed that among the three factors including legal and technocal environment, specialized hardwareand software, and high speed internet

  6. VICKEY: Mining Conditional Keys on Knowledge Bases

    OpenAIRE

    Symeonidou , Danai; Galárraga , Luis; Pernelle , Nathalie; Saïs , Fatiha; Suchanek , Fabian

    2017-01-01

    International audience; A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs of millions of facts. We also show that the conditional keys we mine can improve the quality of entity linking by up to 47 percentage points.

  7. No-signaling quantum key distribution: solution by linear programming

    Science.gov (United States)

    Hwang, Won-Young; Bae, Joonwoo; Killoran, Nathan

    2015-02-01

    We outline a straightforward approach for obtaining a secret key rate using only no-signaling constraints and linear programming. Assuming an individual attack, we consider all possible joint probabilities. Initially, we study only the case where Eve has binary outcomes, and we impose constraints due to the no-signaling principle and given measurement outcomes. Within the remaining space of joint probabilities, by using linear programming, we get bound on the probability of Eve correctly guessing Bob's bit. We then make use of an inequality that relates this guessing probability to the mutual information between Bob and a more general Eve, who is not binary-restricted. Putting our computed bound together with the Csiszár-Körner formula, we obtain a positive key generation rate. The optimal value of this rate agrees with known results, but was calculated in a more straightforward way, offering the potential of generalization to different scenarios.

  8. Optimal attacks on qubit-based Quantum Key Recycling

    Science.gov (United States)

    Leermakers, Daan; Škorić, Boris

    2018-03-01

    Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.

  9. Nuclear energy: a key role despite problems

    International Nuclear Information System (INIS)

    Anderson, E.V.

    1977-01-01

    Nuclear energy is projected to be the fastest growing power source and a key to meeting power demands in spite of the many problems facing the nuclear industry in the form of delays, protests, and cancellations. Pressures for a nuclear moratorium will slow the industry, Mr. Anderson feels, but in the long run nuclear reactors will make up an increasing share of the power generating capacity. The Arthur D. Little Co. projects a fourfold increase between 1975 and 1985 on the basis of 10-year lead times for construction of nuclear power plants. Half the new generating capacity after 1985 will be nuclear. Problems besetting every stage of the nuclear fuel cycle result from debates over proliferation, waste disposal, reactor safety, and environmental damage and lead to controversy over regulations and licensing. U.S. utilities are not ordering reactors, but manufacturers are finding markets in other countries. Financial difficulties have kept domestic utilities from undertaking large investment programs until they can resolve problems of fuel costs and rate structures. New construction is inevitable, however, to meet future electrical requirements. Nuclear companies, which number nearly 1300 manufacturers and service providers, need to develop a better public image by working together to demonstrate their ability to manage the risks and uncertainties

  10. Recursive estimation of the claim rates and sizes in an insurance model

    Directory of Open Access Journals (Sweden)

    Lakhdar Aggoun

    2004-01-01

    Full Text Available It is a common fact that for most classes of general insurance, many possible sources of heterogeneity of risk exist. Premium rates based on information from a heterogeneous portfolio might be quite inadequate. One way of reducing this danger is by grouping policies according to the different levels of the various risk factors involved. Using measure change techniques, we derive recursive filters and predictors for the claim rates and claim sizes for the different groups.

  11. Streamflow ratings

    Science.gov (United States)

    Holmes, Robert R.; Singh, Vijay P.

    2016-01-01

    Autonomous direct determination of a continuous time series of streamflow is not economically feasible at present (2014). As such, surrogates are used to derive a continuous time series of streamflow. The derivation process entails developing a streamflow rating, which can range from a simple, single-valued relation between stage and streamflow to a fully dynamic one-dimensional model based on hydraulics of the flow.

  12. DESAIN KEY PERFORMANCE INDICATOR UNTUK PENGUKURAN KINERJA INDUSTRI JASA BERDASARKAN BUDAYA ORGANISASI DENGAN MENGGUNAKAN METODE BSC-AHP (Studi Kasus Hotel Di Semarang)

    OpenAIRE

    Setiawan, Nashrullah; Farmansyah, Andang

    2016-01-01

    In 2014 tourist arrivals in Semarang decreased when compared to 2013, which caused the occupancy rate also decreased, this led to increasingly fierce competition among businessmen hospitality. Performance measurement is one way companies look at how big the achievement of the company today. Performance measurement method used is balanced scorecard. This method is able to assess the company not only from the financial aspect, but also from non-financial aspects with reference to the four persp...

  13. Simple security proof of quantum key distribution based on complementarity

    International Nuclear Information System (INIS)

    Koashi, M

    2009-01-01

    We present an approach to the unconditional security of quantum key distribution protocols based on a complementarity argument. The approach is applicable to, but not limited to, every case that has been treated via the argument by Shor and Preskill based on entanglement distillation, with a benefit of decoupling of the error correction from the privacy amplification. It can also treat cases with uncharacterized apparatuses. We derive a secure key rate for the Bennett-Brassard-1984 protocol with an arbitrary source characterized only by a single parameter representing the basis dependence.

  14. Spherical reconciliation for a continuous-variable quantum key distribution

    International Nuclear Information System (INIS)

    Lu Zhao; Shi Jian-Hong; Li Feng-Guang

    2017-01-01

    Information reconciliation is a significant step for a continuous-variable quantum key distribution (CV-QKD) system. We propose a reconciliation method that allows two authorized parties to extract a consistent and secure binary key in a CV-QKD protocol, which is based on Gaussian-modulated coherent states and homodyne detection. This method named spherical reconciliation is based on spherical quantization and non-binary low-density parity-check (LDPC) codes. With the suitable signal-to-noise ratio (SNR) and code rate of non-binary LDPC codes, spherical reconciliation algorithm has a high efficiency and can extend the transmission distance of CV-QKD. (paper)

  15. Key conclusions from AVOID Work Stream One

    Science.gov (United States)

    Warren, Rachel

    2010-05-01

    AVOID work stream (WS1)one has produced emission scenarios that simulate potential future global emission pathways for greenhouse gases during the 21st century. The study explored the influence of three key features of such pathways: (1) the year in which emissions peak globally, (2) the rate of emission reduction, and (3) the minimum level to which emissions are eventually reduced. It examined the resultant climate change, climate change impacts and economic implications using computer simulations. Avoided impacts, carbon taxes and GDP change increase throughout the 21st century in the models. AVOID-WS1 showed that in the absence of climate policy it is very likely that global mean temperatures would exceed 3 degrees and there are evens chances that the temperature would rise by 4 degrees relative to pre-industrial times. Scenarios that peak emissions in 2016 were more effective at constraining temperatures to below 3 degrees than those that peaked in 2030: one ‘2016' scenario achieved a probability of 45% of avoiding breaching of a 2 degree threshold. Scenarios peaking in 2030 were inconsistent with constraining temperatures to below 2 degrees. Correspondingly, scenarios that peak in 2030 are more effective at avoiding climate impacts than scenarios that peak in 2016, for all sectors that we studied. Hence the date at which emissions peak is more important than the rate of subsequent emissions reduction in determining the avoided impacts. Avoided impacts increase with time, being negligible in the 2030s, significant by the 2050s and large by the 2080s. Finally, the choice of GCM influences the magnitude of the avoided impacts strongly, so that the uncertainties in our estimates of avoided impacts for each scenario are larger than the difference between the scenarios. Our economic analysis is based on models which differ greatly in the assumptions that they make, but generally show that the date at which emissions peak is a stronger driver of induced GDP changes

  16. Maximizing growth rate at low temperatures: RNA:DNA allocation strategies and life history traits of Arctic and temperate Daphnia

    NARCIS (Netherlands)

    Van Geest, G.J.; Sachse, R.; Brehm, Michaela; Van Donk, E.; Hessen, D.O.

    2010-01-01

    Many short-lived or univoltine organisms at high latitudes and altitudes face the challenge to complete their life-cycle within a brief growing season. This means that they need to maintain a high growth rate at low temperatures, and one way of doing this is to allocate limiting resources like

  17. Secret-key expansion from covert communication

    Science.gov (United States)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  18. Adaptive spatial filtering for daytime satellite quantum key distribution

    Science.gov (United States)

    Gruneisen, Mark T.; Sickmiller, Brett A.; Flanagan, Michael B.; Black, James P.; Stoltenberg, Kurt E.; Duchane, Alexander W.

    2014-11-01

    The rate of secure key generation (SKG) in quantum key distribution (QKD) is adversely affected by optical noise and loss in the quantum channel. In a free-space atmospheric channel, the scattering of sunlight into the channel can lead to quantum bit error ratios (QBERs) sufficiently large to preclude SKG. Furthermore, atmospheric turbulence limits the degree to which spatial filtering can reduce sky noise without introducing signal losses. A system simulation quantifies the potential benefit of tracking and higher-order adaptive optics (AO) technologies to SKG rates in a daytime satellite engagement scenario. The simulations are performed assuming propagation from a low-Earth orbit (LEO) satellite to a terrestrial receiver that includes an AO system comprised of a Shack-Hartmann wave-front sensor (SHWFS) and a continuous-face-sheet deformable mirror (DM). The effects of atmospheric turbulence, tracking, and higher-order AO on the photon capture efficiency are simulated using statistical representations of turbulence and a time-domain waveoptics hardware emulator. Secure key generation rates are then calculated for the decoy state QKD protocol as a function of the receiver field of view (FOV) for various pointing angles. The results show that at FOVs smaller than previously considered, AO technologies can enhance SKG rates in daylight and even enable SKG where it would otherwise be prohibited as a consequence of either background optical noise or signal loss due to turbulence effects.

  19. Establishing Key Performance Indicators : Case company X

    OpenAIRE

    Singh, Jatinder

    2015-01-01

    The key performance indicators serve as the navigational tools for a business organization to monitor its performance. They enable the management team to take real time decisions to keep organization’s resources aligned to its business strategy to accomplish its strategic objec-tives. This research was conducted to analyse the process of establishing successful key per-formance indicators for a business organization. The research was conducted to recommend key performance indicators developme...

  20. Competency Assessment Using Key Performance Indicators

    OpenAIRE

    Elena Alexandra Toader; Laura Brad

    2015-01-01

    The paper proposes a method for computing the scores of the key performance indicators resulted in the competency assessment process. The key performance indicators are estimated considering four performance levels that an IT professional can obtain at the end of the assessment process. We suggest as the best approach for estimating the performance key indicators an online questionnaire filled by 60 employees that work in IT Romanian companies. The results provide evidence that the difference...

  1. Enciphered Data Steganography Using Secret Key

    Directory of Open Access Journals (Sweden)

    BANGALORE G.Tilak

    2010-10-01

    Full Text Available A new method is proposed to maintain thesecrecy of data by enciphering and embedding using asecret key. There is no restriction on the length of thekey used to encipher and embed the data. Since the keyis not stored for validation, it prevents unauthorizedaccess to the key, even if decoding procedure is known.The correct message can be recovered only with thespecific key used in encipherment and embedding. Thismethod can also be used for multiple levelsteganography.

  2. FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION

    Directory of Open Access Journals (Sweden)

    B. Lakshmi

    2010-09-01

    Full Text Available In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated. Presently available encryption systems, suffer from Brute force attack and in such a case, the time taken for breaking a code depends on the system used for cryptanalysis. The proposed scheme provides an effective method in which the time is taken as the second dimension of the key so that the same system can defend against brute force attack more vigorously. In the proposed scheme, the key is rotated continuously and four bits are drawn from the key with their concatenated value representing the delay the system has to wait. This forms the time based key concept. Also the key based function selection from a pool of functions enhances the confusion and diffusion to defend against linear and differential attacks while the time factor inclusion makes the brute force attack nearly impossible. In the proposed scheme, the key scheduler is implemented on FPGA that generates the right key at right time intervals which is then connected to a NIOS – II processor (a virtual microcontroller which is brought out from Altera FPGA that communicates with the keys to the personal computer through JTAG (Joint Test Action Group communication and the computer is used to perform encryption (or decryption. In this case the FPGA serves as hardware key (dongle for data encryption (or decryption.

  3. EPA Monthly Key Performance Indicator Dashboards 2017

    Science.gov (United States)

    Each month, the Web Analytics Program posts updated Key Performance Indicator (KPI) dashboards that correspond to three Web performance goals: content consumption, content discovery, and audience engagement.

  4. Nickel exposure from keys: a Brazilian issue.

    Science.gov (United States)

    Suzuki, Nathalie Mie; Duarte, Ida Alzira Gomes; Hafner, Mariana de Figueiredo Silva; Lazzarini, Rosana

    2017-01-01

    Keys are a significant source of exposure to metal allergens and can be a relevant problem for nickel-allergic individuals. This study aimed to perform nickel and cobalt spot testing among the 5 most common Brazilian brands of keys. Among the tested keys, 100% showed positive result to nickel spot test, 83,3% presented strong positive reaction. 50% exhibited cobalt release as well. Nickel release from keys is very common in our country and may cause a negative impact on sensitized individual's quality of life. Study's results highlight the importance of establishing directives to regulate nickel release in Brazil.

  5. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Science.gov (United States)

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice... section 5(d)(2) of the Home Owners' Loan Act, the Office of Thrift Supervision has duly appointed the Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  6. Information Systems Management: an Australian view of the key issues

    Directory of Open Access Journals (Sweden)

    Graham Pervan

    1994-05-01

    Full Text Available Studies investigating the key issues in IS management serve to better understand the concerns of IS managers and help to guide IS researchers in choosing IS management problems worthy of investigation. This paper presents results from a study of the key issues facing the IS managers of Australia's largest 300 organisations which is part of a three-yearly longitudinal study. In order to gain consensus on the relative importance of the key issues, a three-round Delphi method was applied. The results reveal that IS strategic planning continues to be the paramount issue in our industry, as are many issues associated with IS strategic planning, including responsiveness of the IT infrastructure, effective use of the data resource, IS for competitive advantage, and a comprehensive information architecture. A greater emphasis on quality is also revealed in highly rated issues such as effective use of the data resource, data integrity and quality assurance, and the quality of software development

  7. Key management of the double random-phase-encoding method using public-key encryption

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  8. Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

    Science.gov (United States)

    Shaik, Cheman

    A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an additional security measure that enables encryptions to survive private key compromise attacks.

  9. Key-value store with internal key-value storage interface

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.; Tzelnic, Percy; Gupta, Uday; Grider, Gary; Bonnie, David J.

    2018-01-16

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or more batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.

  10. Securing information using optically generated biometric keys

    Science.gov (United States)

    Verma, Gaurav; Sinha, Aloka

    2016-11-01

    In this paper, we present a new technique to obtain biometric keys by using the fingerprint of a person for an optical image encryption system. The key generation scheme uses the fingerprint biometric information in terms of the amplitude mask (AM) and the phase mask (PM) of the reconstructed fingerprint image that is implemented using the digital holographic technique. Statistical tests have been conducted to check the randomness of the fingerprint PM key that enables its usage as an image encryption key. To explore the utility of the generated biometric keys, an optical image encryption system has been further demonstrated based on the phase retrieval algorithm and the double random phase encoding scheme in which keys for the encryption are used as the AM and the PM key. The advantage associated with the proposed scheme is that the biometric keys’ retrieval requires the simultaneous presence of the fingerprint hologram and the correct knowledge of the reconstruction parameters at the decryption stage, which not only verifies the authenticity of the person but also protects the valuable fingerprint biometric features of the keys. Numerical results are carried out to prove the feasibility and the effectiveness of the proposed encryption system.

  11. Eight Key Facets of Small Business Management.

    Science.gov (United States)

    Scott, James Calvert

    1980-01-01

    Identifies eight key facets of small business management and suggests activities that may be used to assist in their development. The key facets are (1) product or service, (2) competition, (3) marketing strategies, (4) personnel needs, (5) equipment and facility needs, (6) finances, (7) planning, and (8) entrepreneurship. (JOW)

  12. Quantum key distribution using three basis states

    Indian Academy of Sciences (India)

    Home; Journals; Pramana – Journal of Physics; Volume 54; Issue 5. Quantum key distribution using three ... This note presents a method of public key distribution using quantum communication of photons that simultaneously provides a high probability that the bits have not been tampered. It is a variant of the quantum ...

  13. Optimizing Key Updates in Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Sensor networks offer the advantages of simple and low–resource communication. Nevertheless, security is of particular importance in many cases such as when sensitive data is communicated or tamper-resistance is required. Updating the security keys is one of the key points in security, which...

  14. Locks & keys service moves to building 55

    CERN Multimedia

    2012-01-01

    Please note that as of July 12 Locks & keys service will be at building 55 second floor. The opening hours are as follows: 08:30 am to 12:30 pm - 1:30 pm to 5:30 pm. The procedures and rules relating to applications for key and cylinder have not changed. GI-IS Group

  15. Strategy Keys as Tools for Problem Solving

    Science.gov (United States)

    Herold-Blasius, Raja

    2017-01-01

    Problem solving is one of the main competences we seek to teach students at school for use in their future lives. However, when dealing with mathematical problems, teachers encounter a wide variety of difficulties. To foster students' problem-solving skills, the authors developed "strategy keys." Strategy keys can serve as material to…

  16. Secure key distribution by swapping quantum entanglement

    International Nuclear Information System (INIS)

    Song, Daegene

    2004-01-01

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes

  17. A survey on exploring key performance indicators

    Directory of Open Access Journals (Sweden)

    Mohammed Badawy

    2016-12-01

    Full Text Available Key Performance Indicators (KPIs allows gathering knowledge and exploring the best way to achieve organization goals. Many researchers have provided different ideas for determining KPI's either manually, and semi-automatic, or automatic which is applied in different fields. This work concentrates on providing a survey of different approaches for exploring and predicting key performance indicators (KPIs.

  18. The LOFAR Transients Key Science Project

    NARCIS (Netherlands)

    Stappers, B.; Fender, R.; Wijers, R.

    2009-01-01

    The Transients Key Science Project (TKP) is one of six Key Science Projects of the next generation radio telescope LOFAR. Its aim is the study of transient and variable low-frequency radio sources with an extremely broad science case ranging from relativistic jet sources to pulsars, exoplanets,

  19. Multiparty quantum key agreement with single particles

    Science.gov (United States)

    Liu, Bin; Gao, Fei; Huang, Wei; Wen, Qiao-yan

    2013-04-01

    Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. That is, a secure QKA protocol can not only prevent the outside attackers from stealing the key, but also resist the attack from inside participants, i.e. some dishonest participants determine the key alone by illegal means. How to resist participant attack is an aporia in the design of QKA protocols, especially the multi-party ones. In this paper we present the first secure multiparty QKA protocol against both outside and participant attacks. Further more, we have proved its security in detail.

  20. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  1. Rate theory

    International Nuclear Information System (INIS)

    Maillard, S.; Skorek, R.; Maugis, P.; Dumont, M.

    2015-01-01

    This chapter presents the basic principles of cluster dynamics as a particular case of mesoscopic rate theory models developed to investigate fuel behaviour under irradiation such as in UO 2 . It is shown that as this method simulates the evolution of the concentration of every type of point or aggregated defect in a grain of material. It produces rich information that sheds light on the mechanisms involved in microstructure evolution and gas behaviour that are not accessible through conventional models but yet can provide for improvements in those models. Cluster dynamics parameters are mainly the energetic values governing the basic evolution mechanisms of the material (diffusion, trapping and thermal resolution). In this sense, the model has a general applicability to very different operational situations (irradiation, ion-beam implantation, annealing) provided that they rely on the same basic mechanisms, without requiring additional data fitting, as is required for more empirical conventional models. This technique, when applied to krypton implanted and annealed samples, yields a precise interpretation of the release curves and helps assess migration mechanisms and the krypton diffusion coefficient, for which data is very difficult to obtain due to the low solubility of the gas. (authors)

  2. Fundamental study on the size and inter-key spacing of numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1996-12-01

    The purpose of this study was to reveal the optimum size and inter-key spacing of numeric square keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) volunteered as subjects for this experiment. Each subject took part in data entry tasks using numeric square keys of touch devices. The sizes of keys were 6, 12, 21, 30 and 39 mm and each the inter-key spacing was 0, 3, 6, 12 and 21 mm. Response times with key sizes of 6 and 12 mm were significantly slower than with key sizes of 21 and 30 mm (p touch screens should be more than 21 mm and optimum inter-key spacing should be from 3 to 6 mm. Optimum key size, however, must be selected with regard to the limitation of screen size.

  3. New weak keys in simplified IDEA

    Science.gov (United States)

    Hafman, Sari Agustini; Muhafidzah, Arini

    2016-02-01

    Simplified IDEA (S-IDEA) is simplified version of International Data Encryption Algorithm (IDEA) and useful teaching tool to help students to understand IDEA. In 2012, Muryanto and Hafman have found a weak key class in the S-IDEA by used differential characteristics in one-round (0, ν, 0, ν) → (0,0, ν, ν) on the first round to produce input difference (0,0, ν, ν) on the fifth round. Because Muryanto and Hafman only use three differential characteristics in one-round, we conducted a research to find new differential characteristics in one-round and used it to produce new weak key classes of S-IDEA. To find new differential characteristics in one-round of S-IDEA, we applied a multiplication mod 216+1 on input difference and combination of active sub key Z1, Z4, Z5, Z6. New classes of weak keys are obtained by combining all of these characteristics and use them to construct two new differential characteristics in full-round of S-IDEA with or without the 4th round sub key. In this research, we found six new differential characteristics in one round and combined them to construct two new differential characteristics in full-round of S-IDEA. When two new differential characteristics in full-round of S-IDEA are used and the 4th round sub key required, we obtain 2 new classes of weak keys, 213 and 28. When two new differential characteristics in full-round of S-IDEA are used, yet the 4th round sub key is not required, the weak key class of 213 will be 221 and 28 will be 210. Membership test can not be applied to recover the key bits in those weak key classes. The recovery of those unknown key bits can only be done by using brute force attack. The simulation result indicates that the bit of the key can be recovered by the longest computation time of 0,031 ms.

  4. Participatory action research: The key to successful implementation ...

    African Journals Online (AJOL)

    Unfortunately many of these innovative changes in training have met resistance from lecturers and students simply because they are just imposed on them. One way of ensuring acceptability and success of innovative and evidence-based training methods in health sciences could be the use of participatory action research ...

  5. Intergenerational equity and the social discount rate

    OpenAIRE

    Scarborough, Helen

    2011-01-01

    Recent modelling of the costs and benefits of climate change has renewed debate regarding assumptions for the social discount rate in analysing the impacts of environmental change. Previous literature suggests two key factors influence estimates of the social discount rate: the rate of pure time preference and the elasticity of marginal utility of future consumption. These components of the social discount rate reinforce the linkages between the choice of social discount rate and intergenerat...

  6. Antioxidant role of glutathione S-transferases: 4-Hydroxynonenal, a key molecule in stress-mediated signaling.

    Science.gov (United States)

    Singhal, Sharad S; Singh, Sharda P; Singhal, Preeti; Horne, David; Singhal, Jyotsana; Awasthi, Sanjay

    2015-12-15

    4-Hydroxy-2-trans-nonenal (4HNE), one of the major end products of lipid peroxidation (LPO), has been shown to induce apoptosis in a variety of cell lines. It appears to modulate signaling processes in more than one way because it has been suggested to have a role in signaling for differentiation and proliferation. It has been known that glutathione S-transferases (GSTs) can reduce lipid hydroperoxides through their Se-independent glutathione-peroxidase activity and that these enzymes can also detoxify LPO end-products such as 4HNE. Available evidence from earlier studies together with results of recent studies in our laboratories strongly suggests that LPO products, particularly hydroperoxides and 4HNE, are involved in the mechanisms of stress-mediated signaling and that it can be modulated by the alpha-class GSTs through the regulation of the intracellular concentrations of 4HNE. We demonstrate that 4HNE induced apoptosis in various cell lines is accompanied with c-Jun-N-terminal kinase (JNK) and caspase-3 activation. Cells exposed to mild, transient heat or oxidative stress acquire the capacity to exclude intracellular 4HNE at a faster rate by inducing GSTA4-4 which conjugates 4HNE to glutathione (GSH), and RLIP76 which mediates the ATP-dependent transport of the GSH-conjugate of 4HNE (GS-HNE). The balance between formation and exclusion promotes different cellular processes - higher concentrations of 4HNE promote apoptosis; whereas, lower concentrations promote proliferation. In this article, we provide a brief summary of the cellular effects of 4HNE, followed by a review of its GST-catalyzed detoxification, with an emphasis on the structural attributes that play an important role in the interactions with alpha-class GSTA4-4. Taken together, 4HNE is a key signaling molecule and that GSTs being determinants of its intracellular concentrations, can regulate stress-mediated signaling, are reviewed in this article. Copyright © 2015 Elsevier Inc. All rights

  7. Antioxidant role of glutathione S-transferases: 4-Hydroxynonenal, a key molecule in stress-mediated signaling

    International Nuclear Information System (INIS)

    Singhal, Sharad S.; Singh, Sharda P.; Singhal, Preeti; Horne, David; Singhal, Jyotsana; Awasthi, Sanjay

    2015-01-01

    4-Hydroxy-2-trans-nonenal (4HNE), one of the major end products of lipid peroxidation (LPO), has been shown to induce apoptosis in a variety of cell lines. It appears to modulate signaling processes in more than one way because it has been suggested to have a role in signaling for differentiation and proliferation. It has been known that glutathione S-transferases (GSTs) can reduce lipid hydroperoxides through their Se-independent glutathione-peroxidase activity and that these enzymes can also detoxify LPO end-products such as 4HNE. Available evidence from earlier studies together with results of recent studies in our laboratories strongly suggests that LPO products, particularly hydroperoxides and 4HNE, are involved in the mechanisms of stress-mediated signaling and that it can be modulated by the alpha-class GSTs through the regulation of the intracellular concentrations of 4HNE. We demonstrate that 4HNE induced apoptosis in various cell lines is accompanied with c-Jun-N-terminal kinase (JNK) and caspase-3 activation. Cells exposed to mild, transient heat or oxidative stress acquire the capacity to exclude intracellular 4HNE at a faster rate by inducing GSTA4-4 which conjugates 4HNE to glutathione (GSH), and RLIP76 which mediates the ATP-dependent transport of the GSH-conjugate of 4HNE (GS-HNE). The balance between formation and exclusion promotes different cellular processes — higher concentrations of 4HNE promote apoptosis; whereas, lower concentrations promote proliferation. In this article, we provide a brief summary of the cellular effects of 4HNE, followed by a review of its GST-catalyzed detoxification, with an emphasis on the structural attributes that play an important role in the interactions with alpha-class GSTA4-4. Taken together, 4HNE is a key signaling molecule and that GSTs being determinants of its intracellular concentrations, can regulate stress-mediated signaling, are reviewed in this article. - Highlights: • GSTs are the major

  8. Key Facts about Seasonal Flu Vaccine

    Science.gov (United States)

    ... Swine Variant Pandemic Other Key Facts About Seasonal Flu Vaccine Language: English (US) Español Recommend on Facebook ... the flu is to get vaccinated each year. Flu Vaccination Why should people get vaccinated against the ...

  9. China demonstrates intercontinental quantum key distribution

    Science.gov (United States)

    Johnston, Hamish

    2017-11-01

    A quantum cryptography key has been shared between Beijing and Vienna using a satellite - allowing the presidents of the Chinese Academy of Sciences and Austrian Academy of Sciences to communicate via a secure video link.

  10. Key Principles of Superfund Remedy Selection

    Science.gov (United States)

    Guidance on the primary considerations of remedy selection which are universally applicable at Superfund sites. Key guidance here include: Rules of Thumb for Superfund Remedy Selection and Role of the Baseline Risk Assessment.

  11. Key Royale bridge five year evaluation.

    Science.gov (United States)

    2013-06-01

    This report describes the design, construction, instrumentation, and five-year evaluation of the Key Royale Bridge substructure. The primary focus was the evaluation of the implementation of highly reactive supplementary cementitious materials (SCM) ...

  12. Keys to Successful EPIQ Business Demonstrator Implementation

    NARCIS (Netherlands)

    Shoikova, Elena; Denishev, Vladislav

    2009-01-01

    Shoikova, E., & Denishev, V. (2009). Keys to Successful EPIQ Business Demonstrator Implementation. Paper presented at the 'Open workshop of TENCompetence - Rethinking Learning and Employment at a Time of Economic Uncertainty-event'. November, 19, 2009, Manchester, United Kingdom: TENCompetence.

  13. Secure image retrieval with multiple keys

    Science.gov (United States)

    Liang, Haihua; Zhang, Xinpeng; Wei, Qiuhan; Cheng, Hang

    2018-03-01

    This article proposes a secure image retrieval scheme under a multiuser scenario. In this scheme, the owner first encrypts and uploads images and their corresponding features to the cloud; then, the user submits the encrypted feature of the query image to the cloud; next, the cloud compares the encrypted features and returns encrypted images with similar content to the user. To find the nearest neighbor in the encrypted features, an encryption with multiple keys is proposed, in which the query feature of each user is encrypted by his/her own key. To improve the key security and space utilization, global optimization and Gaussian distribution are, respectively, employed to generate multiple keys. The experiments show that the proposed encryption can provide effective and secure image retrieval for each user and ensure confidentiality of the query feature of each user.

  14. Renyi information gain on quantum key

    International Nuclear Information System (INIS)

    Brandt, Howard E

    2007-01-01

    The concept of maximum Renyi information gain from quantum key is important in eavesdropping and security analyses of quantum key distribution. It is particularly useful in the design optimization of eavesdropping probes. The present work reviews the quantitative measure of Renyi information gain, its optimization, and application to the design of eavesdropping probes in which single-photon probe states become optimally entangled with the signal states on their way between the legitimate transmitter and receiver

  15. Multipartite secret key distillation and bound entanglement

    International Nuclear Information System (INIS)

    Augusiak, Remigiusz; Horodecki, Pawel

    2009-01-01

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  16. Mathematical Background of Public Key Cryptography

    DEFF Research Database (Denmark)

    Frey, Gerhard; Lange, Tanja

    2005-01-01

    The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material.......The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material....

  17. Soil fauna: key to new carbon models

    OpenAIRE

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; Jiménez, Juan José

    2016-01-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined ...

  18. A Key to the Art of Letters

    DEFF Research Database (Denmark)

    Jensen-Rix, Robert William

    2008-01-01

    The article examines A. Lane's grammar A Key to the Art of Letters and its contexts. Symbolically published at the threshold to the eighteenth century, Lane presents an unusually bold plan to make English a world language. Although Lane's book holds a key position in the development of English...... that Lane is the first to use English as the basis for writing universal grammar, as part of his strategy to promote English as a universal code for learning and science...

  19. Fundamental quantitative security in quantum key generation

    International Nuclear Information System (INIS)

    Yuen, Horace P.

    2010-01-01

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  20. Key handling in wireless sensor networks

    International Nuclear Information System (INIS)

    Li, Y; Newe, T

    2007-01-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided

  1. Key handling in wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Li, Y; Newe, T [Optical Fibre Sensors Research Centre, Department of Electronic and Computer Engineering, University of Limerick, Limerick (Ireland)

    2007-07-15

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  2. Key-Phenomenon and Religious Meaning

    Directory of Open Access Journals (Sweden)

    Lomuscio Vincenzo

    2017-09-01

    Full Text Available In this paper I develop a phenomenology of religious experience through the notion of keyphenomenon. My analysis moves from a general phenomenology of situation, in which we have to relate different phenomena according to a sense. What does “according to a sense” mean? My suggestion is that we should look for a relationship among these data when we find a key-phenomenon (among a series of phenomena that would enlighten all the others. This key-phenomenon would show a non-phenomenal meaning which would make all the others understandable. Each other datum, therefore, becomes the witness of invisible meaning through a key-witness. The key-phenomenon we choose determines the role (i.e., the truth of each datum within its situation. This phenomenological relationship belongs to both the sense of day-life situations, and that one of possible religious situations. If the religious interpretation of a situation depends on our choice of key-phenomenon, or key-witness, we have to define what kind of keyphenomenon constitutes a religious intuition.

  3. Key Frame Extraction in the Summary Space.

    Science.gov (United States)

    Li, Xuelong; Zhao, Bin; Lu, Xiaoqiang; Xuelong Li; Bin Zhao; Xiaoqiang Lu; Lu, Xiaoqiang; Li, Xuelong; Zhao, Bin

    2018-06-01

    Key frame extraction is an efficient way to create the video summary which helps users obtain a quick comprehension of the video content. Generally, the key frames should be representative of the video content, meanwhile, diverse to reduce the redundancy. Based on the assumption that the video data are near a subspace of a high-dimensional space, a new approach, named as key frame extraction in the summary space, is proposed for key frame extraction in this paper. The proposed approach aims to find the representative frames of the video and filter out similar frames from the representative frame set. First of all, the video data are mapped to a high-dimensional space, named as summary space. Then, a new representation is learned for each frame by analyzing the intrinsic structure of the summary space. Specifically, the learned representation can reflect the representativeness of the frame, and is utilized to select representative frames. Next, the perceptual hash algorithm is employed to measure the similarity of representative frames. As a result, the key frame set is obtained after filtering out similar frames from the representative frame set. Finally, the video summary is constructed by assigning the key frames in temporal order. Additionally, the ground truth, created by filtering out similar frames from human-created summaries, is utilized to evaluate the quality of the video summary. Compared with several traditional approaches, the experimental results on 80 videos from two datasets indicate the superior performance of our approach.

  4. Phase-encoded measurement device independent quantum key distribution without a shared reference frame

    Science.gov (United States)

    Zhuo-Dan, Zhu; Shang-Hong, Zhao; Chen, Dong; Ying, Sun

    2018-07-01

    In this paper, a phase-encoded measurement device independent quantum key distribution (MDI-QKD) protocol without a shared reference frame is presented, which can generate secure keys between two parties while the quantum channel or interferometer introduces an unknown and slowly time-varying phase. The corresponding secret key rate and single photons bit error rate is analysed, respectively, with single photons source (SPS) and weak coherent source (WCS), taking finite-key analysis into account. The numerical simulations show that the modified phase-encoded MDI-QKD protocol has apparent superiority both in maximal secure transmission distance and key generation rate while possessing the improved robustness and practical security in the high-speed case. Moreover, the rejection of the frame-calibrating part will intrinsically reduce the consumption of resources as well as the potential security flaws of practical MDI-QKD systems.

  5. Finite-key-size effect in a commercial plug-and-play QKD system

    Science.gov (United States)

    Chaiwongkhot, Poompong; Sajeed, Shihan; Lydersen, Lars; Makarov, Vadim

    2017-12-01

    A security evaluation against the finite-key-size effect was performed for a commercial plug-and-play quantum key distribution (QKD) system. We demonstrate the ability of an eavesdropper to force the system to distill key from a smaller length of sifted-key. We also derive a key-rate equation that is specific for this system. This equation provides bounds above the upper bound of secure key under finite-key-size analysis. From this equation and our experimental data, we show that the keys that have been distilled from the smaller sifted-key size fall above our bound. Thus, their security is not covered by finite-key-size analysis. Experimentally, we could consistently force the system to generate the key outside of the bound. We also test manufacturer’s software update. Although all the keys after the patch fall under our bound, their security cannot be guaranteed under this analysis. Our methodology can be used for security certification and standardization of QKD systems.

  6. Quantum key distribution with an unknown and untrusted source

    Science.gov (United States)

    Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong

    2009-03-01

    The security of a standard bi-directional ``plug & play'' quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we present the first quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard BB84 protocol, weak+vacuum decoy state protocol, and one-decoy decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source. Our work is published in [1]. [4pt] [1] Y. Zhao, B. Qi, and H.-K. Lo, Phys. Rev. A, 77:052327 (2008).

  7. MoKey: A versatile exergame creator for everyday usage.

    Science.gov (United States)

    Eckert, Martina; López, Marcos; Lázaro, Carlos; Meneses, Juan

    2017-11-27

    Currently, virtual applications for physical exercises are highly appreciated as rehabilitation instruments. This article presents a middleware called "MoKey" (Motion Keyboard), which converts standard off-the-shelf software into exergames (exercise games). A configurable set of gestures, captured by a motion capture camera, is translated into the key strokes required by the chosen software. The present study assesses the tool regarding usability and viability on a heterogeneous group of 11 participants, aged 5 to 51, with moderate to severe disabilities, and mostly bound to a wheelchair. In comparison with FAAST (The Flexible Action and Articulated Skeleton Toolkit), MoKey achieved better results in terms of ease of use and computational load. The viability as an exergame creator tool was proven with help of four applications (PowerPoint®, e-book reader, Skype®, and Tetris). Success rates of up to 91% have been achieved, subjective perception was rated with 4.5 points (from 0-5). The middleware provides increased motivation due to the use of favorite software and the advantage of exploiting it for exercise. Used together with communication software or online games, social inclusion can be stimulated. The therapists can employ the tool to monitor the correctness and progress of the exercises.

  8. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  9. Measurement-device-independent quantum key distribution with correlated source-light-intensity errors

    Science.gov (United States)

    Jiang, Cong; Yu, Zong-Wen; Wang, Xiang-Bin

    2018-04-01

    We present an analysis for measurement-device-independent quantum key distribution with correlated source-light-intensity errors. Numerical results show that the results here can greatly improve the key rate especially with large intensity fluctuations and channel attenuation compared with prior results if the intensity fluctuations of different sources are correlated.

  10. Behavior of temperature dependent SRAM-PUFs, and consequences for secret-key capacity

    NARCIS (Netherlands)

    Kusters, C.J.; Ignatenko, T.; Willems, F.M.J.

    2017-01-01

    Physical Unclonable Functions (PUFs) are a resource for generating and sharing secret keys. The mutual information between two respective observations of the same PUF gives an upper bound for the achievable secret-key rate of a secret-sharing scheme that relies on this PUF. This mutual information

  11. Setting objectives for managing Key deer

    Science.gov (United States)

    Diefenbach, Duane R.; Wagner, Tyler; Stauffer, Glenn E.

    2014-01-01

    The U.S. Fish and Wildlife Service (FWS) is responsible for the protection and management of Key deer (Odocoileus virginianus clavium) because the species is listed as Endangered under the Endangered Species Act (ESA). The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. There are a host of actions that could possibly be undertaken to recover the Key deer population, but without a clearly defined problem and stated objectives it can be difficult to compare and evaluate alternative actions. In addition, management goals and the acceptability of alternative management actions are inherently linked to stakeholders, who should be engaged throughout the process of developing a decision framework. The purpose of this project was to engage a representative group of stakeholders to develop a problem statement that captured the management problem the FWS must address with Key deer and identify objectives that, if met, would help solve the problem. In addition, the objectives were organized in a hierarchical manner (i.e., an objectives network) to show how they are linked, and measurable attributes were identified for each objective. We organized a group of people who represented stakeholders interested in and potentially affected by the management of Key deer. These stakeholders included individuals who represented local, state, and federal governments, non-governmental organizations, the general public, and local businesses. This stakeholder group met five full days over the course of an eight-week period to identify objectives that would address the following problem:“As recovery and removal from the Endangered Species list is the purpose of the Endangered Species Act, the U.S. Fish and Wildlife Service needs a management approach that will ensure a sustainable, viable, and healthy Key deer population. Urbanization has affected the behavior and population dynamics of the Key deer and the amount and characteristics

  12. The Logic of Collective Rating

    Science.gov (United States)

    Nax, Heinrich

    2016-05-01

    The introduction of participatory rating mechanisms on online sales platforms has had substantial impact on firms' sales and profits. In this note, we develop a dynamic model of consumer influences on ratings and of rating influences on consumers, focussing on standard 5-star mechanisms as implemented by many platforms. The key components of our social influence model are the consumer trust in the `wisdom of crowds' during the purchase phase and indirect reciprocity during the rating decision. Our model provides an overarching explanation for well-corroborated empirical regularities. We quantify the performance of the voluntary rating mechanism in terms of realized consumer surplus with the no-mechanism and full-information benchmarks, and identify how it could be improved.

  13. Synchronization in Quantum Key Distribution Systems

    Directory of Open Access Journals (Sweden)

    Anton Pljonkin

    2017-10-01

    Full Text Available In the description of quantum key distribution systems, much attention is paid to the operation of quantum cryptography protocols. The main problem is the insufficient study of the synchronization process of quantum key distribution systems. This paper contains a general description of quantum cryptography principles. A two-line fiber-optic quantum key distribution system with phase coding of photon states in transceiver and coding station synchronization mode was examined. A quantum key distribution system was built on the basis of the scheme with automatic compensation of polarization mode distortions. Single-photon avalanche diodes were used as optical radiation detecting devices. It was estimated how the parameters used in quantum key distribution systems of optical detectors affect the detection of the time frame with attenuated optical pulse in synchronization mode with respect to its probabilistic and time-domain characteristics. A design method was given for the process that detects the time frame that includes an optical pulse during synchronization. This paper describes the main quantum communication channel attack methods by removing a portion of optical emission. This paper describes the developed synchronization algorithm that takes into account the time required to restore the photodetector’s operation state after the photon has been registered during synchronization. The computer simulation results of the developed synchronization algorithm were analyzed. The efficiency of the developed algorithm with respect to synchronization process protection from unauthorized gathering of optical emission is demonstrated herein.

  14. High-Speed Large-Alphabet Quantum Key Distribution Using Photonic Integrated Circuits

    Science.gov (United States)

    2014-01-28

    polarizing beam splitter, TDC: time-to-digital converter. Extra&loss& photon/bin frame size QSER secure bpp ECC secure&key&rate& none& 0.0031 64 14...to-digital converter. photon/frame frame size QSER secure bpp ECC secure&key& rate& 1.3 16 9.5 % 2.9 layered LDPC 7.3&Mbps& Figure 24: Operating

  15. Simultaneous classical communication and quantum key distribution using continuous variables*

    Science.gov (United States)

    Qi, Bing

    2016-10-01

    Presently, classical optical communication systems employing strong laser pulses and quantum key distribution (QKD) systems working at single-photon levels are very different communication modalities. Dedicated devices are commonly required to implement QKD. In this paper, we propose a scheme which allows classical communication and QKD to be implemented simultaneously using the same communication infrastructure. More specially, we propose a coherent communication scheme where both the bits for classical communication and the Gaussian distributed random numbers for QKD are encoded on the same weak coherent pulse and decoded by the same coherent receiver. Simulation results based on practical system parameters show that both deterministic classical communication with a bit error rate of 10-9 and secure key distribution could be achieved over tens of kilometers of single-mode fibers. It is conceivable that in the future coherent optical communication network, QKD will be operated in the background of classical communication at a minimal cost.

  16. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  17. Turn-key SRF accelerators to drive subcritical reactors

    International Nuclear Information System (INIS)

    Johnson, Rolland P.

    2011-01-01

    Large particle accelerator projects, both accomplished and proposed, have been used to engage US industry through contracts and grants to develop efficient capabilities to design, develop, produce, and deliver entire accelerator systems or any needed subsystems. Staffed in many cases by experienced scientists and engineers from National Laboratories and Universities, existing companies could extend their portfolios to offer turn-key accelerators with parameters to match the needs of ADS. If the reactors were based on molten salt fuel such that trip rate requirements were relaxed, the developments needed for a multi-MW proton accelerator for ADS would be minimal. Turn-key SRF proton linacs for ADS operation can be ordered now to enable GW-level power generation from natural thorium, natural uranium, or nuclear waste from conventional reactors. (author)

  18. Symmetric Blind Information Reconciliation for Quantum Key Distribution

    International Nuclear Information System (INIS)

    Kiktenko, Evgeniy O.

    2017-01-01

    Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. Finally, the proposed technique is based on introducing symmetry in operations of parties, and the consideration of results of unsuccessful belief-propagation decodings.

  19. A Novel Method for Generating Encryption Keys

    Directory of Open Access Journals (Sweden)

    Dascalescu Ana Cristina

    2009-12-01

    Full Text Available The development of the informational society, which has led to an impressive growth of the information volume circulating in the computer networks, has accelerated the evolution and especially the use of modern cryptography instruments. Today, the commercial products use standard cryptographic libraries that implement certified and tested cryptographic algorithms. Instead, the fragility ofencryption algorithms is given by compositional operations like key handling or key generation. In this sense, the article proposes an innovative method to generate pseudorandom numbers which can be used for the construction of secure stream encryption keys. The proposed method is based on the mathematical complements based on the algebra of the finite fields and uses a particularized structure of the linear feedback shift registers.

  20. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  1. KeyPathwayMiner 4.0

    DEFF Research Database (Denmark)

    Alcaraz, Nicolas; Pauling, Josch; Batra, Richa

    2014-01-01

    release of KeyPathwayMiner (version 4.0) that is not limited to analyses of single omics data sets, e.g. gene expression, but is able to directly combine several different omics data types. Version 4.0 can further integrate existing knowledge by adding a search bias towards sub-networks that contain...... (avoid) genes provided in a positive (negative) list. Finally the new release now also provides a set of novel visualization features and has been implemented as an app for the standard bioinformatics network analysis tool: Cytoscape. CONCLUSION: With KeyPathwayMiner 4.0, we publish a Cytoscape app...

  2. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...

  3. A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.

    Science.gov (United States)

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2015-09-01

    The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to

  4. Designing key-dependent chaotic S-box with larger key space

    International Nuclear Information System (INIS)

    Yin Ruming; Yuan Jian; Wang Jian; Shan Xiuming; Wang Xiqin

    2009-01-01

    The construction of cryptographically strong substitution boxes (S-boxes) is an important concern in designing secure cryptosystems. The key-dependent S-boxes designed using chaotic maps have received increasing attention in recent years. However, the key space of such S-boxes does not seem to be sufficiently large due to the limited parameter range of discretized chaotic maps. In this paper, we propose a new key-dependent S-box based on the iteration of continuous chaotic maps. We explore the continuous-valued state space of chaotic systems, and devise the discrete mapping between the input and the output of the S-box. A key-dependent S-box is constructed with the logistic map in this paper. We show that its key space could be much larger than the current key-dependent chaotic S-boxes.

  5. High-Rate Field Demonstration of Large-Alphabet Quantum Key Distribution

    Science.gov (United States)

    2017-05-22

    Institute of Technology, Cambridge , MA 02139, USA 2Lincoln Laboratory, Massachusetts Institute of Technology, Lexington, MA 02420, USA Distribution A...the detectors or the readout electronics — is saturated by the incoming photon flux, 3 as illustrated in Figure 1(b). In this regime, which extends to...The deployed-fiber testbed comprised a pair of dark fibers running between the main campus of MIT in Cambridge , MA, and MIT Lincoln Laboratory in

  6. High-Rate Field Demonstration of Large-Alphabet Quantum Key Distribution

    Science.gov (United States)

    2016-12-13

    energy encoding is appeal - ing for its compatibility with existing telecommunications infrastructure — which lowers the barriers to widespread adoption...the detectors are just below satu- ration . Although much research has focused on extending the range of QKD links well beyond 100 km (17–19

  7. Polarization states encoded by phase modulation for high bit rate quantum key distribution

    International Nuclear Information System (INIS)

    Liu Xiaobao; Tang Zhilie; Liao Changjun; Lu Yiqun; Zhao Feng; Liu Songhao

    2006-01-01

    We present implementation of quantum cryptography with polarization code by wave-guide type phase modulator. At four different low input voltages of the phase modulator, coder encodes pulses into four different polarization states, 45 o , 135 o linearly polarized or right, left circle polarized, while the decoder serves as the complementary polarizers

  8. Secret-key and identification rates for biometric identification systems with protected templates

    NARCIS (Netherlands)

    Ignatenko, T.; Willems, F.M.J.

    2010-01-01

    In this paper we consider secret generation in biometric identification systems with protected templates. This problem is closely related to the study of the bio metric identification capacity [Willems et al., 2003] and [O’Sullivan and Sclmmid, 2002] and the common randomness generation scheme

  9. One-way traffic: The inferior frontal gyrus controls brain activation in the middle temporal gyrus during divergent thinking

    DEFF Research Database (Denmark)

    Vartanian, Oshin; Beatty, Erin L.; Smith, Ingrid

    2018-01-01

    Contrary to earlier approaches that focused on the contributions of isolated brain regions to the emergence of creativity, there is now growing consensus that creative thought emerges from the interaction of multiple brain regions, often embedded within larger brain networks. Specifically, recent...

  10. One-Way Flow of a Rarefied Gas Induced in a Circular Pipe with a Periodic Temperature Distribution

    National Research Council Canada - National Science Library

    Aoki, K

    2000-01-01

    The steady behavior of a rarefied gas in a circular pipe with a saw-like temperature distribution increasing and decreasing periodically in the direction of the pipe axis is investigated numerically...

  11. Determining Sample Size with a Given Range of Mean Effects in One-Way Heteroscedastic Analysis of Variance

    Science.gov (United States)

    Shieh, Gwowen; Jan, Show-Li

    2013-01-01

    The authors examined 2 approaches for determining the required sample size of Welch's test for detecting equality of means when the greatest difference between any 2 group means is given. It is shown that the actual power obtained with the sample size of the suggested approach is consistently at least as great as the nominal power. However, the…

  12. The functional interplay between the HIF pathway and the ubiquitin system - more than a one-way road.

    Science.gov (United States)

    Günter, Julia; Ruiz-Serrano, Amalia; Pickel, Christina; Wenger, Roland H; Scholz, Carsten C

    2017-07-15

    The hypoxia inducible factor (HIF) pathway and the ubiquitin system represent major cellular processes that are involved in the regulation of a plethora of cellular signaling pathways and tissue functions. The ubiquitin system controls the ubiquitination of proteins, which is the covalent linkage of one or several ubiquitin molecules to specific targets. This ubiquitination is catalyzed by approximately 1000 different E3 ubiquitin ligases and can lead to different effects, depending on the type of internal ubiquitin chain linkage. The best-studied function is the targeting of proteins for proteasomal degradation. The activity of E3 ligases is antagonized by proteins called deubiquitinases (or deubiquitinating enzymes), which negatively regulate ubiquitin chains. This is performed in most cases by the catalytic removal of these chains from the targeted protein. The HIF pathway is regulated in an oxygen-dependent manner by oxygen-sensing hydroxylases. Covalent modification of HIFα subunits leads to the recruitment of an E3 ligase complex via the von Hippel-Lindau (VHL) protein and the subsequent polyubiquitination and proteasomal degradation of HIFα subunits, demonstrating the regulation of the HIF pathway by the ubiquitin system. This unidirectional effect of an E3 ligase on the HIF pathway is the best-studied example for the interplay between these two important cellular processes. However, additional regulatory mechanisms of the HIF pathway through the ubiquitin system are emerging and, more recently, also the reciprocal regulation of the ubiquitin system through components of the HIF pathway. Understanding these mechanisms and their relevance for the activity of each other is of major importance for the comprehensive elucidation of the oxygen-dependent regulation of cellular processes. This review describes the current knowledge of the functional bidirectional interplay between the HIF pathway and the ubiquitin system on the protein level. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. More than One Way to Get There: Pathways of Change in Coparenting Conflict after a Preventive Intervention.

    Science.gov (United States)

    Epstein, Kenneth; Pruett, Marsha Kline; Cowan, Philip; Cowan, Carolyn; Pradhan, Lisa; Mah, Elisabeth; Pruett, Kyle

    2015-12-01

    This study explored pathways of change in the levels of conflict couples experienced after Supporting Father Involvement, an evidence-based, prevention-oriented couples and parenting intervention that included a diverse low-income and working class group of participants. Pathways of change were examined for couples with baseline conflict scores that were initially low, medium, and high. The growth mixture model analysis found that the best-fitting model for change in couples' conflict was represented by three distinctly different change patterns. The intervention was most successful for High-Conflict couples. This finding contributes to a growing literature examining variations in how relationships change over time and the process of change, especially for couples in distress. This study supports further investigation into the impact and costs associated with universal interventions versus those that target specific groups of higher risk families. © 2015 Family Process Institute.

  14. Immersion Classes in an English Setting: One Way for les Anglais to Learn French. Working Papers on Bilingualism, No. 2.

    Science.gov (United States)

    Barik, Henri; And Others

    The results of the evaluation of the French immersion program at a school in a unilingual English environment are described. A battery of tests was administered to a random sample of children from the kindergarten and grade one experimental French immersion classes and to a comparison group composed of children following the regular English…

  15. Keeping health facilities safe: one way of strengthening the interaction between disease-specific programmes and health systems.

    Science.gov (United States)

    Harries, Anthony D; Zachariah, Rony; Tayler-Smith, Katie; Schouten, Erik J; Chimbwandira, Frank; Van Damme, Wim; El-Sadr, Wafaa M

    2010-12-01

    The debate on the interaction between disease-specific programmes and health system strengthening in the last few years has intensified as experts seek to tease out common ground and find solutions and synergies to bridge the divide. Unfortunately, the debate continues to be largely academic and devoid of specificity, resulting in the issues being irrelevant to health care workers on the ground. Taking the theme 'What would entice HIV- and tuberculosis (TB)-programme managers to sit around the table on a Monday morning with health system experts', this viewpoint focuses on infection control and health facility safety as an important and highly relevant practical topic for both disease-specific programmes and health system strengthening. Our attentions, and the examples and lessons we draw on, are largely aimed at sub-Saharan Africa where the great burden of TB and HIV ⁄ AIDS resides, although the principles we outline would apply to other parts of the world as well. Health care infections, caused for example by poor hand hygiene, inadequate testing of donated blood, unsafe disposal of needles and syringes, poorly sterilized medical and surgical equipment and lack of adequate airborne infection control procedures, are responsible for a considerable burden of illness amongst patients and health care personnel, especially in resource-poor countries. Effective infection control in a district hospital requires that all the components of a health system function well: governance and stewardship, financing,infrastructure, procurement and supply chain management, human resources, health information systems, service delivery and finally supervision. We argue in this article that proper attention to infection control and an emphasis on safe health facilities is a concrete first step towards strengthening the interaction between disease-specific programmes and health systems where it really matters – for patients who are sick and for the health care workforce who provide the care and treatment.

  16. Two Versions of the Projection Postulate: From EPR Argument to One-Way Quantum Computing and Teleportation

    Directory of Open Access Journals (Sweden)

    Andrei Khrennikov

    2010-01-01

    of the projection postulate (due to von Neumann and Lüders should be taken into account seriously in the analysis of the basic constructions of quantum information theory. This paper is a review devoted to such an analysis.

  17. No one way ticket from orthography to semantics in recognition memory: N400 and P200 effects of associations.

    Science.gov (United States)

    Stuellein, Nicole; Radach, Ralph R; Jacobs, Arthur M; Hofmann, Markus J

    2016-05-15

    Computational models of word recognition already successfully used associative spreading from orthographic to semantic levels to account for false memories. But can they also account for semantic effects on event-related potentials in a recognition memory task? To address this question, target words in the present study had either many or few semantic associates in the stimulus set. We found larger P200 amplitudes and smaller N400 amplitudes for old words in comparison to new words. Words with many semantic associates led to larger P200 amplitudes and a smaller N400 in comparison to words with a smaller number of semantic associations. We also obtained inverted response time and accuracy effects for old and new words: faster response times and fewer errors were found for old words that had many semantic associates, whereas new words with a large number of semantic associates produced slower response times and more errors. Both behavioral and electrophysiological results indicate that semantic associations between words can facilitate top-down driven lexical access and semantic integration in recognition memory. Our results support neurophysiologically plausible predictions of the Associative Read-Out Model, which suggests top-down connections from semantic to orthographic layers. Copyright © 2016 Elsevier B.V. All rights reserved.

  18. On The Development of One-way Nesting of Air-pollution Model Smog Into Numerical Weather Prediction Model Eta

    Science.gov (United States)

    Halenka, T.; Bednar, J.; Brechler, J.

    The spatial distribution of air pollution on the regional scale (Bohemian region) is simulated by means of Charles University puff model SMOG. The results are used for the assessment of the concentration fields of ozone, nitrogen oxides and other ozone precursors. Current improved version of the model covers up to 16 groups of basic compounds and it is based on trajectory computation and puff interaction both by means of Gaussian diffusion mixing and chemical reactions of basic species. Gener- ally, the method used for trajectory computation is valuable mainly for episodes sim- ulation, nevertheless, climatological study can be solved as well by means of average wind rose. For the study being presented huge database of real emission sources was incorporated with all kind of sources included. Some problem with the background values of concentrations was removed. The model SMOG has been nested into the forecast model ETA to obtain appropriate meteorological data input. We can estimate air pollution characteristics both for episodes analysis and the prediction of future air quality conditions. Necessary prognostic variables from the numerical weather pre- diction model are taken for the region of the central Bohemia, where the original puff model was tested. We used mainly 850 hPa wind field for computation of prognos- tic trajectories, the influence of surface temperature as a parameter of photochemistry reactions as well as the effect of cloudness has been tested.

  19. There's more than one way to climb a tree: Limb length and microhabitat use in lizards with toe pads.

    Directory of Open Access Journals (Sweden)

    Travis J Hagey

    Full Text Available Ecomorphology links microhabitat and morphology. By comparing ecomorphological associations across clades, we can investigate the extent to which evolution can produce similar solutions in response to similar challenges. While Anolis lizards represent a well-studied example of repeated convergent evolution, very few studies have investigated the ecomorphology of geckos. Similar to anoles, gekkonid lizards have independently evolved adhesive toe pads and many species are scansorial. We quantified gecko and anole limb length and microhabitat use, finding that geckos tend to have shorter limbs than anoles. Combining these measurements with microhabitat observations of geckos in Queensland, Australia, we observed geckos using similar microhabitats as reported for anoles, but geckos with relatively longer limbs were using narrower perches, differing from patterns observed in anoles and other lizards. We also observed arboreal geckos with relatively shorter proximal limb segments as compared to rock-dwelling and terrestrial geckos, similar to patterns observed for other lizards. We conclude that although both geckos and anoles have adhesive pads and use similar microhabitats, their locomotor systems likely complement their adhesive pads in unique ways and result in different ecomorphological patterns, reinforcing the idea that species with convergent morphologies still have idiosyncratic characteristics due to their own separate evolutionary histories.

  20. One Way or Another: Evidence for Perceptual Asymmetry in Pre-attentive Learning of Non-native Contrasts

    Directory of Open Access Journals (Sweden)

    Liquan Liu

    2018-03-01

    Full Text Available Research investigating listeners’ neural sensitivity to speech sounds has largely focused on segmental features. We examined Australian English listeners’ perception and learning of a supra-segmental feature, pitch direction in a non-native tonal contrast, using a passive oddball paradigm and electroencephalography. The stimuli were two contours generated from naturally produced high-level and high-falling tones in Mandarin Chinese, differing only in pitch direction (Liu and Kager, 2014. While both contours had similar pitch onsets, the pitch offset of the falling contour was lower than that of the level one. The contrast was presented in two orientations (standard and deviant reversed and tested in two blocks with the order of block presentation counterbalanced. Mismatch negativity (MMN responses showed that listeners discriminated the non-native tonal contrast only in the second block, reflecting indications of learning through exposure during the first block. In addition, listeners showed a later MMN peak for their second block of test relative to listeners who did the same block first, suggesting linguistic (as opposed to acoustic processing or a misapplication of perceptual strategies from the first to the second block. The results also showed a perceptual asymmetry for change in pitch direction: listeners who encountered a falling tone deviant in the first block had larger frontal MMN amplitudes than listeners who encountered a level tone deviant in the first block. The implications of our findings for second language speech and the developmental trajectory for tone perception are discussed.